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", @generic="eddb442d6884a3d215be3b7f0f2664a46d96aeef6100b9ef7c20aeae868e75c92491a7852c263d0b6610165a1d56"]}, 0x1100}, {&(0x7f0000002d00)={0x4ec, 0x28, 0x100, 0x70bd2d, 0x25dfdbfe, "", [@generic="664e710ff92f883f271229c53fc89399f5a7e2213f735a01357b3b7001d7b6c8072c0d72b75e9a2e42845ce8bb3f32b5485c16fc38", @nested={0x90, 0x43, [@typed={0x84, 0x48, @binary="2ef9cbe6503126afc042e143a5f3ec69a8d39f366de57f1d2d045199c6da6ee4f10bcefd33e1c549b42029d58e94dbb1af1f33dcb2a73aaa8394deb2eb9b3e1b9ec6c1d948b1e1d72aebbc8019c87f70629da060fd1c97374e61a030681f27ebd0eafee6db57e1d7e6b8f29316ad1c484824f233355cee6556aa5edbd3"}, @typed={0x8, 0x56, @uid=r10}]}, @nested={0x2c4, 0x8a, [@generic="64f69916e1d391d1628c581baebde6119051b73c65ba9e72829ba4b864697b93afb80c57490c2d39ec", @generic="a4324d493bffa5e4e8b8b1d249926d2388f0c616f611787361d439ef753b92e9f7e6c7b12a40ff64484cc96138b78078efd0072fe2", @generic="ed660969e2ea95e29634c95483f658ffe96791ddc0f11ad22db182bac3542417544d197081f284debf7638506307668298fe78894b3a67e713c8bf2531b450d5274fd14e72653376aba9d58f3c4f68f3d487978c2387c455897f64015f93a5e36c07ebc5f2ac3ab88b17e516ca9e9b97090825a2bdc1b0b1a7349c72d1a551fb5daff11902a9abe36afb08", @typed={0x14, 0x71, @ipv6=@ipv4={[], [], @multicast2}}, @typed={0x4, 0x8e}, @typed={0x8, 0x32, @uid=r11}, @generic="5802fcaa5a9b1c5cc419fc71dae385d10b26c417e35fed8a7a316dbc8ea4e87a907f9fc6e56b647295ec1f151640a2f9cef20a10907fe5b318a2923c95311208841cef4990f4135a225ec7634a2bd87a3e5cc292123b2d8bd404684ac2f06297cfb2e748b2064e6c9affa8ee99", @generic="bb8eb2206c44568a02366c5ca472566a98dd094f7d6c311ac6dccf84507f30ab98c8730135f726fac26fff822f64e43faa4676cfb7fe7b37ec6ddd2fcbeac770259ee3d751dcf48c644e6e46f6668304e7f9ee0db7c86b852c1bdddf7908fc374c54", @generic="add38e83e23aa5261e3d7693da23e999ca6c9d84ba1b9ed6469ffe44934d91e7d7203560023f522a96335af41d35cd41c0853aa536ef9e657c7216f87bbc5bbcb76f831c28662d701fab9658334e7f5f097b4b15355ad2b227bbc94d225102533e8712307bfdaf67ce7d07b36c658cac3537491c943641f5a2895b15b256dbb7662ab88d70a80363ef10c133ef2f0b24805fb67c9a1b5f5c3b64c36c08a15c8445ef455362b0d32e982466af84f0ebd8edbd465a0a664efd9efd43d0a247eb3a124ec74e9031537ba97e191329a634f34fca54ac442ac3d6537c388cc4b7f7c23bdd3aae24be4036"]}, @typed={0x4, 0x59}, @generic="a0fb473bab54b9486072ea3f162e01ab1a2fe1fcd0bee4e0305aac025d0ee8e49938cb02a97e7e9f1695d483f7b569d1e53d71dda9076a350a539789c86afc7511f77c92910ae5363876eda4ef36ad850dde1baffea35a01cc8fea3d35268a0023cab64a659255fd2eed16b2de85dc25e87f1c", @nested={0xdc, 0x31, [@generic="ea84e6ee3f103f20964bc7e917112a7e60a09d10e15e125cb076d3c2efd189e282e6e8c11be8f707126b120ad9e8ea56a90344b5f5430ccf87c8e8b784327278c613d192f258b994816abda1d6e8ec", @generic="0fa78260bfebd7e04e6d712616f37c7f5423bd76d6bcb96f21db9e58158fecb338eb4beb740d69fd10a8773956135700549427ee22be95746843c63ec080181351b1d4895d08c5cca30406f3fe86fc995f8d949932e5152780a7c4cc0d6a13fe1c0badf0f54e5614100c6f6592989cd004e20247ea4186e74823ee16d9436b77", @typed={0x8, 0x16, @pid=r7}]}]}, 0x4ec}, {&(0x7f0000003200)={0x2a8, 0x16, 0x1, 0x70bd2d, 0x25dfdbfd, "", [@generic="a9dc528ac92fa36e7981b840e35c460d6156d1018e4d01c9e3dc13b3095c1b6d1868e657de1737b6", @typed={0x8, 0x26, @fd=r1}, @generic="08d0be0e0217940e22c54ffbe7ff3022df9591d9455fbd4640b6a207be6b1e2e3b9e096bbd34b79ba33e0a06fae1ce19566b8f1556ada5e2e139ced757397374ec2718fc57548dd091afec56fbd9ea2941f025ba44acdf0d968231ae9dd0a40f7eb710958176d04942d81b6b5396245101a51879a1be3f66d865f1d45409f6d141677a559771a7ec1092f14aba9423d2cfce3c6451a06f1a533fab5078128a793fb2b226d533d25965d840f7a0d1b72ebce112ab11df33e087967cbf", @generic="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", @generic="57b3c81c6ea74444c44908083d408c94120ff884fdf1a1a0ab36e1e477ecb6fa3a0757bc500f0f0c45ef3ac4655430cd0a102ce0778ed343bb808064c0cbcd4cc9d22682528765079147615f7b6634de983f9d8836c938c9aee45ebd30065e83772f5a5a3fc09352c182759202f7ac0372c89b5e06662d2f92e0aa64092d071bb2cd5be28cb847e53daad0f8cedf110f3a15f392be46fa35c51bd4345164", @typed={0x10, 0xf, @str='.vboxnet0*\x00'}]}, 0x2a8}, {&(0x7f0000000780)={0x74, 0x18, 0x200, 0x9, 0x25dfdbff, "", [@generic="32a5d198c9a1de840a9d76aa1acedc10c0d77835426e3ae96bf8dda7103180f687bf6b20433448115a9e27e5fd807c7f70417430dd0ff05959e095106584ab9daff9dd924a8265537773d99563488dbcc8d32f3181dacd09d69321a1", @typed={0x8, 0x2d, @ipv4=@multicast1}]}, 0x74}], 0x6, &(0x7f0000003600)=[@cred={0x18, 0x1, 0x2, r0, r12, r13}, @cred={0x18, 0x1, 0x2, r0, r14, r15}], 0x30, 0x20000000}, 0x850) 22:45:01 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) ptrace$getregs(0xe, r2, 0x100, &(0x7f0000000080)=""/51) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000000)=0x19, 0x4) 22:45:01 executing program 5: socketpair(0x0, 0x6, 0x1ff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000100)=0x80) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) 22:45:01 executing program 0: pipe2(&(0x7f0000000280)={0xffffffffffffffff}, 0x84800) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000001340)=0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x6, 0x71, 0xffffffffffffffff, 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000080)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) delete_module(&(0x7f0000000240)='\x00', 0x200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x7) getpeername$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) sendto$inet6(r0, &(0x7f0000002580)="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", 0x1205, 0x41012, &(0x7f00000002c0)={0xa, 0x4e20, 0x2, @mcast1, 0x3369bc66000}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000200)={@empty, r4}, 0x14) memfd_create(&(0x7f0000000140)='em0&wlan0systemkeyring\x00', 0x1) 22:45:01 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xa) r1 = dup(r0) write$P9_RREAD(r1, &(0x7f0000000000)={0x24, 0x75, 0x0, {0x19, "e50bdcd7a738fe2ae0db116397dd7f4e19aa7bcb442d307c30"}}, 0x24) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) 22:45:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='-\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='IPVS\x00', r1) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000340), 0x4) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) exit(0x868) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') timerfd_create(0x6, 0x800) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:01 executing program 0: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord\x00', 0x400, 0x0) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000040)=""/43) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) 22:45:01 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x400000000, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2200, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x45000600}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x30, r2, 0xb10, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:01 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000040)=0x7fff) 22:45:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r1 = socket$inet6(0xa, 0x4, 0x9de6) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000008c0)=@nat={'nat\x00', 0x1b, 0x5, 0x5a0, 0x248, 0x0, 0x0, 0x3a0, 0x248, 0x4d4, 0x4d4, 0x4d4, 0x4d4, 0x4d4, 0x5, &(0x7f0000000400), {[{{@ipv6={@dev={0xfe, 0x80, [], 0x1c}, @local, [0xffffffff, 0xff0000ff, 0xff, 0xff000000], [0xffffffff, 0xffffffff, 0x0, 0xff0000ff], 'syzkaller1\x00', 'team0\x00', {0xff}, {0xff}, 0x0, 0x4, 0x5, 0x20}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x10, @ipv6=@dev={0xfe, 0x80, [], 0x1e}, @ipv6=@remote, @gre_key=0xa788, @gre_key=0x65}}}, {{@ipv6={@remote, @empty, [0xff000000, 0xffffff00], [0xffffffff, 0xffffffff, 0xffffff00, 0xff0000ff], 'nr0\x00', 'ifb0\x00', {0xff}, {0xff}, 0x0, 0x7, 0x0, 0x4c}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@inet=@length={0x28, 'length\x00', 0x0, {0x9, 0x100000001, 0x1}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x14, @ipv6=@dev={0xfe, 0x80, [], 0x17}, @ipv4=@broadcast, @icmp_id=0x67, @port=0x4e24}}}, {{@ipv6={@local, @local, [0xffffffff, 0xff000000, 0xff000000, 0xffffff00], [0xa426cf47eaad4753, 0x0, 0xff000000, 0xff000000], 'syzkaller0\x00', 'ip6tnl0\x00', {0xff}, {}, 0xc, 0x80000000000000, 0x2, 0x10}, 0x0, 0x110, 0x158, 0x0, {}, [@common=@mh={0x24, 'mh\x00', 0x0, {0xa042, 0x1}}, @common=@icmp6={0x24, 'icmp6\x00', 0x0, {0x5, 0x20000000000000, 0x3, 0x1}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@ipv4, @icmp_id=0x64, @icmp_id=0x7ff}}}, {{@ipv6={@loopback, @mcast2, [0xff, 0xffffff00, 0xffffff00, 0xffffffff], [0xffffffff, 0xffffffff, 0xffffff00, 0xffffffff], 'syzkaller0\x00', 'veth1_to_bond\x00', {0xff}, {}, 0x2b, 0x1000, 0x3, 0x8}, 0x0, 0xec, 0x134, 0x0, {}, [@common=@hl={0x24, 'hl\x00', 0x0, {0x3, 0xffffffff00000001}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x8, @ipv4=@remote, @ipv4=@loopback, @icmp_id=0x66, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xcc}, {0x24}}}}, 0x5fc) r2 = socket(0xf, 0x6, 0x53) getsockopt$packet_int(r2, 0x107, 0x1b, &(0x7f0000000000), &(0x7f0000000340)=0x4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r4, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x801}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xb4, r5, 0x802, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xbd}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfffffffffffffffd}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x40}, 0x4000) keyctl$set_timeout(0xf, r3, 0x7) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:01 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000840)={0x0, 0x0, 0x4, 0x0, [], [{0x800, 0x8001, 0x0, 0x2, 0x6, 0x7}, {0x7, 0xb8, 0x7ff, 0xfffffffffffffffd, 0x4a, 0x89}], [[], [], [], []]}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:01 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) socketpair(0x11, 0x3, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000080), 0x4) write$eventfd(r1, &(0x7f0000000040)=0x3, 0x8) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x30) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) 22:45:01 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:01 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) 22:45:01 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) pwritev(r0, &(0x7f00000003c0)=[{&(0x7f0000000000)="e5c1aeb2319ab79f4053a5f82a3dc844e6404eabf4908e5cf37770af5b38064a66a45478853312164cb9b420736ee9bb479263030a96f23fe1e2376f8cadab42860567f6d9cdab51deb6ab1472bbe3b6338413b147174b523f0b6d3820d8198c0b7dc2221643e1350d9b3977aa799383df745cc202b3663aea8857ccd201efd7d29a2705c8fec6a5f4f450b63f8192b1fd5bde5a8fc7d5fe66c30205f5a21e525954562dc9129b49a3d1f5b2671d1bec35982f4f63962456ba9ca6676928774182021e3e7661110b", 0xc8}, {&(0x7f0000000140)="70253e4d09fb7a603f61", 0xa}, {&(0x7f0000000180)="2b1e1f3b21dd02eac262203149", 0xd}, {&(0x7f00000001c0)="34a55b3225ea992cac3ac20d9b6b0e291ba8648d7466d4456855f3645d9e3b9dd1ce5e671c61bf99edca1ebd4bebff893782fd45dc86225db17e93442e1405d7182e4296803aee0f5a88f9f5242d53be4b1e3042932dee8599281e3267c936460d3b4273da4da84d11d143c8f1876006071287251f94aec7a46a044cbb7f2534b6eb674337298dce6a1c68d761", 0x8d}, {&(0x7f0000000280)="c52c220a8bcf5151f294c815b31567e1d05eab6dfbec304bbc2a", 0x1a}, {&(0x7f00000002c0)="3b01f93ef909f7fcebcb61fd68d1b68d9ab6a7253ce2bf0515abd13a7bafa4992a4d1d25468c40", 0x27}, {&(0x7f0000000300)="111066d1ba1129e91e1c187f586967b5586618ac2f873148577816688265147ab8d3828aa90465d994cf460100024ba640c05368e21c41758d3dc492983dfc94108f13c6ad8af1755bcec1269fda40c7889d4488725cb2aa124b0ed4d423679aed5839a61d879b56d193e0a9256f5c9114", 0x71}, {&(0x7f0000000380)="6d43e9ed956e8a23775ba295e2da8637c2fc9214cc1f4ec3cf3cfb24d4b94e", 0x1f}], 0x8, 0x0) prctl$setmm(0x23, 0x5, &(0x7f0000ffa000/0x4000)=nil) 22:45:01 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) socketpair(0x2, 0x5, 0x1ff, &(0x7f0000000080)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000401}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x48, r2, 0x100, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xab}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8ee8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0x48}}, 0x1) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x797, {0x1, 0x1000, 0x8001, 0x2a58, 0x100000000, 0x1f}}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:01 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x101, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) eventfd2(0x400, 0x801) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000000)) r1 = open(&(0x7f00000012c0)='./file0\x00', 0x0, 0x80) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f0000001300)=""/207, &(0x7f0000001400)=0xcf) 22:45:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000180)=0xe8) r3 = getegid() chown(&(0x7f0000000040)='./file0\x00', r2, r3) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000001c0)={'bond_slave_1\x00', {0x2, 0x4e24, @rand_addr=0x1}}) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000200)=0x1, 0x4) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:02 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) write$P9_RFLUSH(r0, &(0x7f00000000c0)={0x7, 0x6d, 0x2}, 0x7) 22:45:02 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x10000, 0x10) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={{r1, r2/1000+30000}, {0x77359400}}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) r4 = memfd_create(&(0x7f0000000040)="9a6adac3c8fef809339dc2c910965f4c62b7edf341764c0bba45ce869afd01d198acab4a95a8dea70007652ad3c804cb5c5124782263d6d796f743348592", 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891b, &(0x7f0000000000)={'team_slave_0\x00', {0x2, 0x4e24, @local}}) 22:45:02 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) pipe2(&(0x7f00000002c0)={0xffffffffffffffff}, 0x4800) ioctl$TIOCNOTTY(r2, 0x5422) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) lseek(r1, 0x0, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') pwrite64(r0, &(0x7f0000000180)="508b6729108d00b58b5ecee171a052314ddf93586a504994a14db1b0f9c4d5d15e663503806975b146ceb1efcf0fac0bf413fcd25801fa94c9fd86cdaa52cd424a61ec9eb32e49e8a82dadba4d1346161f3ba4fe5d6d7d1afc298febf355e022a9233e1c86fd6d5ca1201268886cdbca4db262733035a48c8e8aa0601c572c6252e33db857dbd2022353bd2307720adf675356f36971acf37acaf849e8d07694", 0xa0, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) ioctl$EVIOCSABS2F(r3, 0x401845ef, &(0x7f0000000280)={0x1, 0x3, 0xff, 0x2, 0x6, 0x6}) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="7365637572697479000000000000000000000000000000000000000000000000b40000004aa837e453e82cb4266dfb881b5be30df591bd62f4e28d46fe658a5e1616a9eee77efbb846b64bae95f8125aeec5d45d6c8ea4d18dcdf8be5d132c24d436e72a1ea90a12bba620c812c5f12c901ba220ad834ae78c292a15cd8091a05aa5e71e70809dd2e37216c1d1e893187ca089a43c37820400eddb7f494ab06b747717a4e1712e870e056bcf23cff72bbcac918eb50cb04df050b63bdb6d29227094c062313de9e56700816045c979024728c286c28f68"], &(0x7f0000000000)=0xd8) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:02 executing program 1: pipe2$9p(&(0x7f0000000980)={0xffffffffffffffff}, 0x80000) dup(r0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') fcntl$getownex(r3, 0x10, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') inotify_init1(0x800) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000400)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000480)=0xc) stat(&(0x7f0000000500)='./file1\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)=0x0) lsetxattr$system_posix_acl(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000900)={{}, {0x1, 0x1}, [{0x2, 0x1, r4}, {0x2, 0x1, r5}], {0x4, 0x2}, [{0x8, 0xdd431e73ee17daec, r6}, {0x8, 0x2, r7}, {0x8, 0x1, r8}], {0x10, 0x4}, {0x20, 0x1}}, 0x4c, 0x2) getsockname(r2, &(0x7f00000009c0)=@hci, &(0x7f0000000a40)=0x80) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x20000, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 22:45:02 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) listen(r0, 0xffffffffb7f02663) r1 = fcntl$getown(r0, 0x9) syz_open_procfs(r1, &(0x7f0000000000)='clear_refs\x00') openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='bcsf0\x00', 0x10) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) 22:45:02 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f0000000040)}, 0x10) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast2, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) socket(0x2, 0x1, 0x5) set_thread_area(&(0x7f0000000280)={0x1, 0x20001000, 0xffffffffffffffff, 0x794, 0x4, 0x5, 0x400, 0x2, 0x1, 0xa44d}) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000a80)={0x401, 0x851f}) setuid(r3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000a00)=@broute={'broute\x00', 0x20, 0x3, 0x6dc, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000300], 0x0, &(0x7f00000000c0), &(0x7f0000000300)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{{{0x7, 0x25, 0x86dd, 'syzkaller0\x00', 'gre0\x00', 'veth0_to_bridge\x00', 'bcsh0\x00', @empty, [0x0, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0x0, 0xff, 0x0, 0x0, 0xff], 0x200, 0x2b8, 0x2e8, [@comment={'comment\x00', 0x100}, @stp={'stp\x00', 0x48, {{0x800, {0x6, 0x4, 0x1, @local, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], 0x3f5, 0x0, 0xfffffffffffffff9, 0x2, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x4e23, 0x4e21, 0x4119, 0x1, 0x8001, 0x29b6, 0xcc, 0x7, 0xfffffffffffffff8, 0x8}, 0x8, 0x1}}}]}, [@common=@nflog={'nflog\x00', 0x4c, {{0x6, 0x8001, 0x6, 0x0, 0x0, "6f435d33a67466a6216c5b53c4bd8aebd3f6112a0c03fd8574aa7490e585a222580a9420037014a053aaf4d2d396ec394ecde5ac47e887a99ba6ed4e551c9956"}}}, @common=@LED={'LED\x00', 0x24, {{'syz0\x00', 0x0, 0x6}}}]}, @common=@dnat={'dnat\x00', 0xc, {{@random="d53f2a30516c", 0xfffffffffffffffc}}}}, {{{0x9, 0xa, 0x88b5, 'syzkaller0\x00', 'bcsf0\x00', 'irlan0\x00', 'irlan0\x00', @empty, [0xff, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], 0xf8, 0x224, 0x26c, [@ipvs={'ipvs\x00', 0x28, {{@ipv6=@ipv4={[], [], @remote}, [0xffffffff, 0x0, 0xffffff00, 0xffffffff], 0x4e23, 0x0, 0x3, 0x4e24, 0x6, 0x10}}}, @quota={'quota\x00', 0x18, {{0x0, 0x0, 0x2, 0x3}}}]}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x3, 'system_u:object_r:printer_device_t:s0\x00'}}}]}, @common=@log={'log\x00', 0x24, {{0x343b, "ea39f73c5eee5a636c9c4e0f509f2240f621fb0b28e820978b6bbd84ee26"}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x11, 0x52, 0x8aff, 'vcan0\x00', 'bpq0\x00', 'ip6gre0\x00', 'vlan0\x00', @remote, [0xff, 0xff, 0xff, 0xff, 0xff], @remote, [0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0xc8, 0xf8}, [@common=@dnat={'dnat\x00', 0xc, {{@remote, 0xfffffffffffffffe}}}, @common=@AUDIT={'AUDIT\x00', 0x4}]}, @common=@dnat={'dnat\x00', 0xc, {{@dev={[], 0x1b}, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff}]}, 0x72c) 22:45:02 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000002c0)={'raw\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x67) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000200)={@mcast1, 0x0}, &(0x7f0000000240)=0x14) recvfrom$packet(r0, &(0x7f0000000140)=""/146, 0x92, 0x0, &(0x7f0000000280)={0x11, 0x6, r2, 0x1, 0xf, 0x6, @random="3f87f38d1e74"}, 0x14) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x105000, 0x10) 22:45:02 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2008b2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r2, 0x114, 0xccaa, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xd}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x24048084}, 0x0) 22:45:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000000, 0x42011, r0, 0x0) 22:45:02 executing program 1: gettid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r2, r2, 0xf, 0x2}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:02 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 22:45:02 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)='/$selinux\x00', 0xfffffffffffffffe) keyctl$get_security(0x11, r1, &(0x7f0000000180)=""/117, 0x75) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000040)) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000008, 0x4a010, r2, 0x0) 22:45:02 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)=0x0) sched_getparam(r0, &(0x7f0000000080)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x202, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 22:45:02 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x401, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x500, 0x0) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000200)=[{0x80000001}, {0x9, 0x1ff}, {0x0, 0x6}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, r0, 0x0, 0x5, &(0x7f0000000340)='IPVS\x00'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r2, 0x50, &(0x7f0000000480)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r3, r1, 0x0, 0xa, &(0x7f0000000440)='/dev/null\x00', r4}, 0x30) r5 = syz_open_procfs(0x0, &(0x7f00000008c0)="7461736b007b5d3c389b32f5dd1e258dda68f8a83d314f98c7bfd5f1d959d10b20ae37203b4aac471a14db92bf90b7e888bb00828cc0de55047fef99de2bd553bfaba8320ed0e981135c781162f2b3ba2cb27da7942b305f3d2b306ca35d30f2705fa3e5867b82bf22e6fe76d1062559771acf9947c0c202e573fce5bfe395357dd6f867397842ae9d62a2baddb9a080247c3eb79f48cf0855e98490ff105ec70be800000000000000003c55942d55b562754722d2161839e4ca52fbd5966e0a3763786749279dac825db6c145c2f5af099d7182c3963b818cdd8c06085ca3f5bb746f9726600739bafe3c2f8f674ff8a3da7b7ca4fa22e4d111dac73cde6b5aca64fb68bce9a67068195b5b2773de4ed5a151d20cf5eda63c52c41b1c0c55d9ab4eb3") syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') fsetxattr$security_selinux(r1, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28, 0x2) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0xfffffffffffff1fc, 0x40000) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$GIO_UNISCRNMAP(r5, 0x4b69, &(0x7f00000003c0)=""/88) 22:45:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:02 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x2, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:02 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x400) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x800, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000040)={0x33, 0x6, 0x0, {0x4, 0x2, 0xa, 0x0, '/dev/zero\x00'}}, 0x33) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f00000001c0)=""/4096, 0x1000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000011c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000001300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80200004}, 0xc, &(0x7f00000012c0)={&(0x7f0000001200)={0x84, r2, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7a}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x985}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x8084}, 0x4000800) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) 22:45:02 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:02 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000000c0)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) fsetxattr$security_smack_transmute(r1, &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x2) 22:45:02 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x23fe, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) 22:45:02 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x6223fe, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) connect$packet(r1, &(0x7f00000001c0)={0x11, 0xff, r2, 0x1, 0x10001, 0x6, @local}, 0x14) 22:45:02 executing program 1: gettid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000001c0)={0x2, 0x1, 0x8, 0x8}, 0xc) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000200)=0x1) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:02 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000240)={0x7fffffff, 0x80000000, 0x2, 0x90000000000, 0x2}) fchdir(r1) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RXATTRCREATE(r2, &(0x7f00000000c0)={0x525}, 0xfffffffffffffdab) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r5 = getpgrp(0x0) r6 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r5, r6, 0x12, &(0x7f0000000000)={0x0, 0x0, 0x40002}) r7 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) read(r7, &(0x7f0000950000)=""/128, 0x80) write$cgroup_int(r4, &(0x7f0000000040), 0x12) truncate(&(0x7f0000000200)='./file0\x00', 0x7fff) syncfs(r2) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000100)={0x0, r4}) r8 = memfd_create(&(0x7f0000000000)='/dev/loop-control\x00', 0x2) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r8, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x70, r9, 0x101, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x8000}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x70}, 0x1, 0x0, 0x0, 0x10}, 0x4008050) 22:45:02 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x80000, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:02 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) 22:45:02 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) timer_create(0x5, &(0x7f00000001c0)={0x0, 0xe, 0x2, @thr={&(0x7f0000000040)="6cee87e4029f9d9875a8d93f9fa5baa950dcb299945cabeb15d47f8b8caebe32e578890c26c145835264d44a01d319e9167ff98cad179003823d07a91c771928186e7fd09819589535708ed2934c0608ba94e6472e90e84f38ccf275c59c7f98397f02af014b8876ba6dad914680e3547f6a616aac2de1ffe8b18a3155240490157d74887b907efdecaa5262f2c262e5f4375f5551fff3b71ab35dae1ec498912d635bbd8ae6b126de256cc5dc3738254a2e9fcb17be5ab9071883cda7a8ea0581d60c7af7f333df9c", &(0x7f0000000140)="acaa22322e2d04ec1ae2f055bfc2346785f71b40a0733a4e2fa8cf634d5f5f1cac0a9c97ce46aa8236e343233f5d7194f89b6ead2c3272f26090f9935f3f97997d028af3b9ae136bd4d3ca3878bb96df59e57352f055e48285d9150120485640a127e5b6e734f7a08cc47e0ce97e8f02df97a0d3656bf9e6d7277053d9"}}, &(0x7f0000000200)=0x0) timer_delete(r1) 22:45:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x1ffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) open(&(0x7f0000000040)='./file0\x00', 0x20000, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:02 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) 22:45:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffffffffffe16, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000640)='\x00', &(0x7f00000002c0)='nr0\x00', &(0x7f0000000340)='\x00', &(0x7f00000003c0)='syzkaller\x00', &(0x7f0000000400)='selinux\x00', &(0x7f0000000440)='.\x00', &(0x7f0000000480)='nodev\x00', &(0x7f00000004c0)='syzkaller\x00', &(0x7f0000000500)='\x00', &(0x7f0000000580)='task\x00'], &(0x7f00000000c0)=[&(0x7f0000000180)="4b505653009f9a4c3889156a736332d036e8864e9d6bafe5597566798e47c3c81a5982531b92a3a24fadad9238b817d4fa54e66ab1e60f233a53322ab232384cafa355a8b82f4c3ac0a33e45bac81bc650b6819f9ed9d7ff863d6947f9a52b5e8a9a8567b3ae305b", &(0x7f0000000200)='\x00'], 0x400) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f00000000c0)="8f", 0x1, 0xfffffff5, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) 22:45:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") unshare(0x400) getsockopt$inet6_mreq(r0, 0x29, 0x12, &(0x7f0000001240)={@local}, &(0x7f0000001280)=0x14) 22:45:02 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/loop-control\x00', 0x44000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$inet_mreq(r2, 0x0, 0x24, &(0x7f0000000040)={@multicast1, @remote}, 0x8) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000080)={{0xaf, @remote, 0x4e22, 0x2, 'wlc\x00', 0x1d, 0x7ff, 0x1f}, {@local, 0x4e21, 0x1, 0x2, 0x4, 0x7fff}}, 0x44) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r1) r3 = memfd_create(&(0x7f00000001c0)="2f6465762f7a65726f00e0969cfc380f60d3f649fb4410c7819c01e5422c1dbb49086543f2173c1e13ce5d74d07410dbb124a86d34e3e9c72a14fe76f544715b5a2ede80e886918f90f053b6f7ba94fd9d12e2777dad8f8fe2178b4df1cd9395258e45febcfca95b111fc17bb95afd1c59660762803d21c8b82abf3053f432f4472d59988c53568481f7928cdbc983c0043ed6f072199db2ed82f536abf489d17ae708ade1f8717892fd32b0922d04fc26018293a47ee9135daa00000000000000000000", 0x20000000000) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) write$binfmt_elf32(r0, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x7, 0xffffffffffffffa6, 0x5, 0x12f1, 0x2, 0x7, 0x7, 0x379, 0x38, 0x1d, 0x5, 0xb08, 0x20, 0x1, 0x0, 0x3}, [{0x7, 0x3fb, 0x10000, 0xe9, 0x5, 0x10001, 0x76, 0x100000000}], "35abcab6a7b585462bd6da37310a6e01d4f10b9541ed076efd7f2dc33a2c9439aea47de90085f1ab03cbbe95e8ada8470816eaf9cffe9d0824c33089888f9554132f1bce05deca0f8233654450260987b7600ac60c590913471f76d7ef16de8a97e0a5d864c472495a3146d97cd83ebfcf4c9811e05ba30790dbe35a0b9e1d31aaa3b34c15f0d3c5f9cf6095dda5d4080eca1acb52126cd2bef1f9af0fee85175d9e15df05bb41470dc9f38653ab3bd492812dc4a421432fcea4e0b46a6b6d1b69760c7dae1d78dabfc142b482f32e19ca9e1e3dd85791eac89ad1329bdae80e7b", [[], [], [], [], [], [], [], [], [], []]}, 0xb39) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000180)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast1, @in6=@loopback, 0x4e21, 0x20, 0x4e24, 0x3ff, 0x2, 0x80, 0x80, 0x1e, r4, r5}, {0x80000000, 0x1000, 0x101, 0x10001, 0x8000, 0x4a8247d4, 0x1, 0x1}, {0x87fd, 0x10000, 0x7f, 0x92e6}, 0x3, 0x6e6bc0, 0x0, 0x0, 0x1, 0x2}, {{@in6, 0x4d5, 0xff}, 0xa, @in6=@mcast1, 0x3505, 0x6, 0x0, 0x0, 0x8001, 0x1ff, 0x3ab9c000000}}, 0xe8) ioctl$sock_inet_SIOCGIFDSTADDR(r3, 0x8917, &(0x7f0000000100)={'ip6tnl0\x00', {0x2, 0x4e21, @rand_addr=0x8}}) 22:45:02 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f00000003c0)) 22:45:02 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/loop-control\x00', 0x200000000, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') sendmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000400)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000840)="d43befc112afc0243f3fcdf83342c4c3d4c97a8e6abc30e8be037ee7c05d5ee61d5b97edecd803f55bc354e2f1e1f70a16ba6c1aa166f62c83b26f69888c2574f862ab6c301e5632fa8192ccf37c429857dc1343f60fafaafc855a388f51b63cc37df4ac38ab73a42035c461a38d65d1a4ff4c07b2fcb4dabeba2673d75f82730aa94c92e742817f7865187d876b1b884c3c72f60218e0ed81a4383349f8cc1bba1d93f7e1ed4d2b7802fd61f233cdf71e5202af4f5d84697d2f01d5c3eae52c66c30cbad663cbbd57b9a12ba850429dbcf533f424", 0xd5}, {&(0x7f0000000640)="e8cda2101f796df0d07c86c577577e5db9e34acde271f7e7536480640db518e7b889735ca6ffda3b43c0efd3f0febb2f65489c783445b26e2e8b130a4ba6ad954eda7a4edb7902c4d5ad8f03feffb961b5c4e356b7fcf041c2afd9c27e5691abc004ec58cad82bbd", 0x68}], 0x2, &(0x7f0000000280)=[@rights={0x1c, 0x1, 0x1, [r2, r1, r1, r1]}], 0x1c, 0x4048004}, 0x20000000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000100)=0x7, 0x4) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:03 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x100, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0xbb, 0x2, 0x6, "4418f1627e6ee03b79c9f1b31e16a9b1", "df4f6aa96735b5e6cc62fa46f6055f55e34a1dc4a3668af29b23b678fc98ded1b22010ee04a7a5faace28b26cc323f3d004a046bb735c53ecc7c6144ca9991a533077a2dfa77907d6c6618be944d2855b42eb14c302a52db9dd3f8dce73cb4739fbde2bcb6ec9c6228d700f69c5103ff0e094fbb18f03441fdea7215e8f6ae3a7fe33920730dbac97cde52eaa0195fcd67a7df7333136a9fd471e3bd91a34b137c222d823e1e"}, 0xbb, 0x5) getsockname$netlink(r1, &(0x7f00000000c0), &(0x7f0000000080)=0xc) 22:45:03 executing program 0: open(&(0x7f0000000200)='./file0\x00', 0x800, 0x40) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000001c0)={'eql\x00'}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x8, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e21, @local}, 0x2, 0x4, 0x3, 0x6b, 0x7, &(0x7f0000000040)='ip_vti0\x00', 0x0, 0x101, 0x1}) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) 22:45:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750", 0x0, 0xab03000000000000}, 0x80, &(0x7f0000002f80)}}], 0x3ac, 0x0) 22:45:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000180)={0x20, 0x0, 0x8, {0x80000000, 0x0, 0x9, 0x800}}, 0x20) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:03 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x403c5404, &(0x7f00000001c0)={{0x0, 0x2, 0x6, 0x3, 0x4}, 0x400, 0x1}) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:03 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) ftruncate(r0, 0xa0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) pivot_root(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)='./file0\x00') ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000180), &(0x7f0000000200)=0x60) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') r3 = fcntl$getown(r0, 0x9) ustat(0x0, &(0x7f0000000340)) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000280)={&(0x7f0000000240)=""/47, 0x2f}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') fdatasync(r1) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040)=0x1, 0xfffffffffffffe0b) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) write$cgroup_subtree(r2, &(0x7f00000002c0)={[{0x2d, 'cpu'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'memory'}, {0x2f, 'rdma'}, {0x2f, 'memory'}, {0x2d, 'io'}, {0x2b, 'cpu'}, {0x2d, 'pids'}]}, 0x35) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) memfd_create(&(0x7f00000000c0)="103a2f70726f63747275737465647b2d3a76626f786e65743000", 0x1) 22:45:03 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) personality(0x8000000) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) 22:45:03 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) 22:45:03 executing program 5: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f0000266ffc), 0x4) sendto$inet(r1, &(0x7f0000000100)="89", 0x1, 0x0, &(0x7f0000000280)={0x2, 0x0, @dev}, 0x10) write$P9_RAUTH(r1, &(0x7f00000001c0)={0x26ab33b3acd62b8}, 0xffffffa7) 22:45:03 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9) 22:45:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) fstatfs(r0, &(0x7f0000000000)=""/203) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) 22:45:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") unshare(0x400) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x42, &(0x7f0000000040)={@local}, &(0x7f00000000c0)=0x20) 22:45:03 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.cpu_exclusive\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000180)=0x1a0ffffffff, 0xd) 22:45:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/access\x00', 0x2, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000080)="523d999d0247f1f78ba9f990264951052f3909b39d02d9313757ffedfa8705fc69bbfa511e0721642f12a1dced6bbac705febfb4a85ce49b694c7424afb407ff4269e3a2", 0x44}], 0x1) 22:45:03 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x7) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:03 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) shutdown(r0, 0x0) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$BLKRRPART(r1, 0x125f, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:03 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x12, &(0x7f0000000000)='/dev/loop-control\x00'}, 0x30) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) rt_tgsigqueueinfo(r1, r2, 0x39, &(0x7f00000000c0)={0x37, 0x5, 0x13, 0x3}) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) 22:45:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fdatasync(r2) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000180)={0x1000000000, 0x0, 0x40, 0x6, 0x7, 0xfc1, 0x9, 0x5, 0x2, 0x10001}) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000001c0)) 22:45:03 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x7f) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0) 22:45:03 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0x2}, 0x8, 0x80000) fcntl$getflags(r0, 0x40b) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 22:45:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x840, 0x1) ioctl$TIOCSBRK(r1, 0x5427) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) 22:45:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) memfd_create(&(0x7f0000000000)='/dev/zero\x00', 0x4) 22:45:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000140)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) sendmsg$nl_netfilter(r1, &(0x7f0000dddfc8)={&(0x7f0000f8d000), 0xc, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000001040501ff2007040100c5f80b000280000000ff103e7b61000000000201000000000000964ac17d"], 0x2c}}, 0x0) 22:45:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = memfd_create(&(0x7f00000004c0)="2f6465762f7a657201000100000000008dcf9948545a1f9ad266f7a0485e5aca3df041408c8f3e0dc23053129c15302bf78a06b87f25ae97e37e95fb1217957d8c080000009bd46b5d72207d644b59ea995f058859be97bcb94a208a292a95d29cf9a3fb78a9b6283740b2fc60c1263aa1efa470c83340c3b7a86df1048ae94098db23639ca63f1ed5a55d1acf9a85b034add751efd8b3cd80e10032045e7b202e0a29a1f195c86af40b9acdcb45e62cd62a1ddbb5866634073bf1d13a0f010f3978b1ddc2843a2fd2c6c4ec8f5dd8c375cbfc61107e1f42d6892621c2e95b444eb0c3d4a8b5e4c310e3d02fa66c3b54", 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000000c0)={0x9f9f, 0x9, 0xf60a, 0x1, 0x6}) ioctl$UI_DEV_CREATE(r1, 0x5501) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000080)) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 670.850686] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. [ 670.860460] netlink: 24 bytes leftover after parsing attributes in process `syz-executor5'. [ 670.884145] netlink: 24 bytes leftover after parsing attributes in process `syz-executor5'. 22:45:03 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x2, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) socket$inet6_tcp(0xa, 0x1, 0x0) 22:45:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000000)=""/61) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYRESOCT], &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f0000000240)) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000600)='fuse\x00', 0x20, &(0x7f0000000680)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xffffffffffffffff}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@context={'context', 0x3d, 'user_u'}}]}}) lsetxattr$security_evm(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.evm\x00', &(0x7f00000002c0), 0x1, 0x0) [ 670.885878] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. [ 670.946649] SELinux: security_context_str_to_sid(user_u) failed for (dev proc, type proc) errno=-22 22:45:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x5, 0x58, 0x5}) 22:45:03 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x80, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="69524fdf73"], 0x15) 22:45:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000180)=""/86) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000540)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000006000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000f0ffff, 0xe, 0x29, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 22:45:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x401, 0x0) dup3(r0, r0, 0x80000) timerfd_create(0x0, 0x800) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) timerfd_gettime(r1, &(0x7f0000000080)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)="19", 0x1, 0x400c000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x14}}, 0x4040050) [ 670.965294] SELinux: security_context_str_to_sid(user_u) failed for (dev proc, type proc) errno=-22 22:45:03 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80) write$FUSE_WRITE(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffffe, 0x8, {0xd52e}}, 0x18) 22:45:03 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) poll(&(0x7f00000001c0)=[{r0, 0x4044}, {r2, 0x4000}], 0x2, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)="19", 0x1, 0x400c000, &(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x14}}, 0x4040050) 22:45:03 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x111000, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x10) 22:45:04 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) sendmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000380)}}, {{&(0x7f00000000c0)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000240), 0x2b5, &(0x7f0000000480)}}], 0x2, 0x0) 22:45:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x1, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = getpgid(0x0) r3 = getpgid(0x0) setpgid(r2, r3) ioctl$TIOCCBRK(r1, 0x5428) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'rose0\x00'}) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r4 = syz_open_procfs(r2, &(0x7f0000000200)="6d61705f665d75e1f24bca696c657300") bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={r4, r1, 0x7, 0x3}, 0x10) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f00000001c0)) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000280)={'mangle\x00'}, &(0x7f0000000340)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 22:45:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") unshare(0x400) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3, &(0x7f0000000040)={@local}, &(0x7f00000000c0)=0x20) 22:45:04 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) socketpair(0x5, 0xa, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000040)=""/55) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) 22:45:04 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 22:45:04 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:04 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = memfd_create(&(0x7f0000000140)='/dev/loop-control\x00', 0x5) r2 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000700)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast1}}, {}]}, 0x18c) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x104) lsetxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:dhcpd_state_t:s0\x00', 0x23, 0x3) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000100)) getpeername$unix(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) r3 = gettid() ptrace$setregs(0xf, r3, 0x8, &(0x7f00000008c0)="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") 22:45:04 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) socketpair$inet6(0xa, 0x5, 0x5aa, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r2, &(0x7f00000000c0)="97d3aba06d21d436a7f809f345730e68a446dad0843b6b008c3b3609feb686ca7bf6eb0c105a4a5415b12b10dd7967d2de6eb7e48d2151e36316", 0x3a, 0x10, &(0x7f00000001c0)={0xa, 0x4e23, 0x6c04, @remote, 0x3f}, 0x1c) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x1410c2, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540), &(0x7f00000001c0), 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) creat(&(0x7f0000000180)='./file0\x00', 0xb) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000400)={0x40}) memfd_create(&(0x7f0000000640)="2f05000000a6308a3f8817a02f7a65726f962e5dc68f786bb2baf6b62e70307b510928d3c1ccb57c731a465af2ad7ff9baff99aa825d45ab4f3a013a684e4c4ddae2535dcf7e355a4e155081cca17a95", 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) 22:45:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 22:45:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x30, 0x24, 0x1, 0x1c, 0xa, 0x7, 0x6, 0x4d, 0x2a2971f6680ab350}) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:04 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_pts(0xffffffffffffff9c, 0x0) execveat(r1, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000440)=[&(0x7f0000000200)='\x00', &(0x7f0000000280)='nr0\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000340)='task\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='vmnet0\x00'], &(0x7f00000005c0)=[&(0x7f0000000480)="93", &(0x7f00000004c0)='*vmnet0\x00', &(0x7f0000000500)="93", &(0x7f0000000580)='nr0\x00'], 0x1400) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000180)=0x2) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) ioctl$FS_IOC_GETVERSION(r1, 0x80047601, &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:04 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) socketpair$inet(0x2, 0x5, 0xff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000140)=ANY=[@ANYBLOB="7f0000010000ac007f004e5dbcd7fbaa19fbf92ce1266b7965283775ca5d40e93438bb43eb35c8b90e08b29032b72224c85c49a01c9166c1388eaa3698e5215d5fbffcda5b9dcddc68f4a3328c268a"], 0x14) getsockopt$inet_mreq(r2, 0x0, 0x24, &(0x7f0000000080)={@rand_addr, @broadcast}, &(0x7f00000000c0)=0x8) setitimer(0x0, &(0x7f0000000040)={{0x0, 0x2710}}, &(0x7f00000001c0)) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) 22:45:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r1, &(0x7f0000000200), 0xfffffffffffffeb4, 0x2000800a, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x8351, 0x7000028, 0x0, 0x9000000]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) recvfrom(r1, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x120, 0x0, 0x4f) 22:45:04 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x20010, r1, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') creat(&(0x7f0000000440)='./file0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000400)="d2d3804fbb40c961ec622e0d390a5af0f4e6adbf9529184ce96f9cd91790285cb285a332de09f65b3efeab15080c6af796b6dc0fbc12c07494f64202", 0x3c, 0xfffffffffffffffd) keyctl$update(0x2, r3, &(0x7f0000000640)="b15188e7cd10a075b48bb5e9b7f4ca8b4d74cfb016bc728f556012e28d109e35e03c15af20fb7515a4c0a2eaf29ecbd9d2ff61762c939e0a7c9b4ba41027719b191420b4d50bea8ad3478af845eec87502b4ceeb9bc7717ebadb6835d550079da349c9b0f51a1796233e3f1bbdb757fe20f426648c894210c3322c8bdeda3be0901f4c55c1d5f9f28a5b43482dd02fdfb119d6ee1dc21d82559bf35c185339d37386afd9073d54148dccbb8b38164434", 0xb0) r4 = memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'nr0\x00', 0x5100}) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000840)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f0000000500)='y\x00', 0x2, 0x2) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000200)={@dev={0xac, 0x14, 0x14, 0xd}, @rand_addr=0x6, r5}, 0xc) 22:45:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x20, 0x52, 0x601}, 0x20}}, 0x0) 22:45:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") epoll_create1(0x200080007fffe) 22:45:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x3000}, {r3, 0x500}, {r1, 0x11}, {r0}, {r1, 0x4002}, {r1, 0x42a2}], 0x6, &(0x7f00000001c0)={r4, r5+10000000}, &(0x7f0000000200)={0x1ff}, 0x8) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:04 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x5c, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000c88000)={r0, &(0x7f0000847f95), &(0x7f000089b000)}, 0x3a8) 22:45:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") unshare(0x400) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x35, &(0x7f0000000040)={@local}, &(0x7f00000000c0)=0x20) 22:45:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000240)={"626f6e645f736c6176655f30000000ee", {0x2, 0x0, @rand_addr=0x80000000}}) 22:45:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:04 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x200000d0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000080)) 22:45:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:04 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='V\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000840)=""/214, 0xd6) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={0x800000000000, {{0x2, 0x0, @dev}}, {{0x2, 0x4e20, @remote}}}, 0x108) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x400000, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000380)={0x4f, 0x29, 0x2, {0x0, [{{0xa2}, 0x0, 0x0, 0xd, './file0/file0'}, {{0x40, 0x0, 0x3}, 0x1000, 0x0, 0x7, './file0'}]}}, 0x4f) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f00000001c0)='fusectl\x00', 0x0, &(0x7f0000000200)='self\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x10, 0x18, &(0x7f0000000000)="5ae02efc441a80536af0d1d96ac723fa", &(0x7f0000000040)=""/24, 0x6000}, 0x28) 22:45:05 executing program 0: clone(0xc0100, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) 22:45:05 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80047601, &(0x7f0000000040)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[{0xf, 0x1}, {0x2, 0x8}, {0x6, 0x8}, {0x8, 0x1f}, {0xe, 0x80000001}], 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:05 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) ioctl$FS_IOC_GETFLAGS(r0, 0x80046601, &(0x7f00000001c0)) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") unshare(0x400) getsockopt$inet6_udp_int(r0, 0x11, 0x64, &(0x7f0000000000), &(0x7f0000000080)=0x4) 22:45:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000440)={0x800000000000, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}}, {{0x2, 0x4e20, @remote}}}, 0x108) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x400000, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000380)={0x8d, 0x29, 0x2, {0x9, [{{0x0, 0x1, 0x6}, 0x10001, 0x8, 0x7, './file0'}, {{0xa2, 0x0, 0x3}, 0x4, 0x5, 0xd, './file0/file0'}, {{0x40, 0x0, 0x3}, 0x1000, 0x0, 0x7, './file0'}, {{0x90, 0x2, 0x5}, 0x1, 0x7cf, 0x7, './file0'}]}}, 0x8d) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x2) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f00000001c0)='fusectl\x00', 0x0, &(0x7f0000000200)='self\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x10, 0x18, &(0x7f0000000000)="5ae02efc441a80536af0d1d96ac723fa", &(0x7f0000000040)=""/24, 0x6000}, 0x28) 22:45:05 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bd000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f00001c1000/0x1000)=nil, 0x1000, 0x3) 22:45:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x20, 0x52, 0x601}, 0x20}}, 0x0) 22:45:05 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = dup(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000080)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)=@newlink={0x88, 0x10, 0x0, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0x0, r2, 0x4000, 0x2000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_bridge\x00'}, @IFLA_LINK={0x8, 0x5, 0x101}, @IFLA_PHYS_PORT_ID={0xc, 0x22, "c578756de0"}, @IFLA_IF_NETNSID={0x8, 0x2e, 0x5d92}, @IFLA_IF_NETNSID={0x8, 0x2e, 0x6b}, @IFLA_LINK_NETNSID={0x8, 0x25, 0x8}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x101}, @IFLA_EXT_MASK={0x8, 0x1d, 0x6}, @IFLA_IFALIASn={0x4}, @IFLA_PHYS_PORT_ID={0x14, 0x22, "6d50582b069fb8ea6b55e29fdfae3a"}]}, 0x88}, 0x1, 0x0, 0x0, 0x40}, 0xc804) syncfs(r0) 22:45:05 executing program 5: 22:45:05 executing program 0: 22:45:05 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000040)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r2, &(0x7f00000003c0)={0x90, 0xfffffffffffffffe, 0x3, {0x3, 0x3, 0x7bf, 0x9, 0x8, 0x7ff, {0x2, 0x0, 0x0, 0x7f, 0x1f, 0xfffffffffffffffb, 0x7ff, 0x5, 0x9, 0xfffffffffffffffb, 0x81, r3, r4, 0xffffffffffffd0f3, 0x40}}}, 0x90) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x1e) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={"45000000000000000000000000f300", 0x5100}) getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f00000002c0)={@local}, &(0x7f0000000200)=0xfffffffffffffc8f) 22:45:05 executing program 5: 22:45:05 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:05 executing program 0: 22:45:05 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x4000000000000002, &(0x7f0000000000)=0x3ff, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) sendto$inet6(r2, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r2, 0x29, 0x6, &(0x7f0000000040), &(0x7f0000000180)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:05 executing program 5: 22:45:05 executing program 5: 22:45:05 executing program 0: 22:45:05 executing program 5: 22:45:05 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x14c40, 0x0) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:05 executing program 0: 22:45:05 executing program 5: 22:45:05 executing program 0: 22:45:05 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x288000, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000000c0)={0xe9, 0x8, 0x1}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x6e) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') 22:45:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setitimer(0x2, &(0x7f0000000040)={{0x77359400}}, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000200)={@loopback, @remote, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000003c0)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@mcast1, 0x4e21, 0x7, 0x2, 0x80000001, 0x2a014231e1cbea3d, 0x80, 0xa0, 0xff, r2, r3}, {0x4, 0x5, 0x7, 0x2, 0x200, 0x1, 0x0, 0x69ff}, {0x10001, 0x7c000000, 0x2, 0x2}, 0x800, 0x6e6bbc, 0x2, 0x1, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0xc}, 0x4d4, 0x3c}, 0x2, @in=@loopback, 0x3504, 0x2, 0x1, 0x3, 0x847, 0x1ff, 0x3}}, 0xe8) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r5 = openat$cgroup_type(r4, &(0x7f0000000180)='cgroup.type\x00', 0x2, 0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:05 executing program 5: 22:45:05 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) getpeername(r0, &(0x7f0000000400)=@nfc_llcp, &(0x7f0000000300)=0x3a) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:05 executing program 0: 22:45:05 executing program 5: 22:45:05 executing program 0: 22:45:05 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) bind(r1, &(0x7f0000001b00)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @remote}, 0x1, 0x2, 0x4}}, 0x80) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000000)={'ip6tnl0\x00', 0xb5}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@local, @in6, 0x4e23, 0x2, 0x4e23, 0x200, 0x2, 0x80, 0x20, 0x7e, 0x0, r2}, {0x0, 0x9, 0xffffffffffff0001, 0x5, 0x101, 0x1, 0x3}, {0x7, 0x3f, 0xffffffffffffffff, 0xbd}, 0x43a, 0x6e6bbc, 0x2, 0x0, 0x2, 0x1}, {{@in=@local, 0x4d6, 0x3b}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x19}, 0x3507, 0x4, 0x0, 0x80000001, 0x9949, 0x6, 0x5}}, 0xe8) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) write$binfmt_elf32(r1, &(0x7f00000008c0)={{0x7f, 0x45, 0x4c, 0x46, 0x100, 0x1, 0x10001, 0xaaa0, 0x0, 0x2, 0x6, 0x5, 0x1ad, 0x38, 0x1f3, 0x1f, 0x1, 0x20, 0x2, 0x2, 0x2, 0xcef}, [{0x70000002, 0x7fffffff, 0x80000001, 0x8, 0x81, 0x3, 0x7, 0x7}, {0x60000000, 0xfffffffffffffffb, 0x7fff, 0x6, 0x6, 0x6f4c, 0x2, 0xeb7}], "40169ba8eee4536dfb49913e22363511a4f68a9185f5792d34a6ae374862930885", [[], [], [], [], [], [], []]}, 0x799) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000002c0)=0x81, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) timer_create(0x2, &(0x7f0000000200)={0x0, 0x3d, 0x0, @thr={&(0x7f0000000040)="e9e382", &(0x7f0000001080)="74239124baa5f4c03d3ecbd28557d0ad8f7c3ade7d03e98702b170543afcc98b66ba707563f2a1c1ec852b1dc04f79598dbfb1c652722470207245905b7c55e510caf14233b2f8d743280d47aa54f23a74e88e5db27e103dfc92110861b36e344cf1dc07cd6387559cb6d1a14de6776fb1d00e3cd3c09f49dc9b7e3acae881a84b31ae7511a957f9fb28a50b2441412ebd21ccd6976948da6fe216620500c2400d01c20999d1b1e80f922ae3e89cca467c1618977c431a2f608eb6ad51df54f66bf10dfc5dddbe9de2eaef45e7fab536d4ccc92d244a508f00d65653f4e4f8bc382896baa1cda79dbac7"}}, &(0x7f0000000280)=0x0) timer_delete(r4) 22:45:05 executing program 5: 22:45:05 executing program 0: 22:45:05 executing program 5: 22:45:05 executing program 5: [ 672.714503] audit: type=1400 audit(1540766705.600:146): avc: denied { bind } for pid=8734 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:45:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:05 executing program 0: 22:45:05 executing program 5: 22:45:05 executing program 4: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x800, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000140)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$TIOCEXCL(r1, 0x540c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40400, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x20, &(0x7f0000000040)={@multicast2, @loopback}, &(0x7f0000000080)=0x8) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xf) 22:45:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:05 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f00000001c0)) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000640)="00bbfd086810e44ef85ed6da5484d9a3fe59a12397b4d3ff3cb65b3bce4c4b233cd86cafae1b2496a3537fedc8d8c61b98984fe88a98a0f49de4b281c1a308a2c6d4b29cec044cc6c6c1cb9bafd6edc6c119941dc7b1afa69d94408e06b9534a3ed72116ee17ec9db74e72d10b5e0343119bd61a48b28d12f3c21690e3810157622bdf3f723499b2fe68000000000000000515da85e2dc883daf771f82d7a5", 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:05 executing program 0: 22:45:05 executing program 0: 22:45:05 executing program 5: 22:45:05 executing program 5: 22:45:05 executing program 0: 22:45:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000180)='/dev/zero\x00', &(0x7f00000001c0)='ppp0vboxnet1-securityem0\x00', &(0x7f0000000200)="93", &(0x7f0000000280)='mime_typeem1cpusetposix_acl_access{\x00', &(0x7f00000002c0)='\x00'], &(0x7f0000000480)=[&(0x7f00000003c0)='IPVS\x00', &(0x7f0000000400)='IPVS\x00', &(0x7f0000000440)='/dev/loop-control\x00'], 0x800) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/status\x00', 0x0, 0x0) 22:45:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000180)=0x2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:05 executing program 0: 22:45:05 executing program 5: 22:45:05 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x2000, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f0000000000)=""/73, 0x49, 0xffffffffffffffff}}, 0x10) r2 = gettid() wait4(r2, &(0x7f0000000140), 0x20000000, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r1, 0x6f) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) write$P9_RXATTRCREATE(r3, &(0x7f0000000100)={0x7, 0x21, 0x2}, 0x7) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat(r4, &(0x7f0000000240)='./file0\x00', 0x480001, 0x120) 22:45:05 executing program 5: 22:45:05 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f00000001c0)=""/10) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000200)=r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:05 executing program 5: 22:45:05 executing program 0: 22:45:05 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) ioctl$VT_DISALLOCATE(r1, 0x5608) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:05 executing program 5: 22:45:05 executing program 0: 22:45:06 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000040)=0x8000) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000180)=0x1, 0xffffffffffffffd3) inotify_init1(0x0) creat(&(0x7f00000001c0)='./file0/file0\x00', 0x186) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:06 executing program 0: 22:45:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x408000, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x4) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000003c0)=0x44, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:06 executing program 5: 22:45:06 executing program 0: 22:45:06 executing program 5: 22:45:06 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') socketpair$inet(0x2, 0xa, 0x8000, &(0x7f00000001c0)) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x6) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:06 executing program 5: 22:45:06 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = getpgid(0x0) ptrace$getregset(0x4204, r1, 0x207, &(0x7f0000000140)={&(0x7f0000000080)=""/69, 0x45}) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x410000, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000040)=[0x20, 0x3f]) 22:45:06 executing program 0: 22:45:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000180)={'raw\x00', 0x55, "9cf5ae58ffb94e63c48169db30469a80f966c6725218c7dff10fda55698d3f093a2fba873b510065d772fb476f68ecf8db26b81c0f3bd7cfb16060eb5369894e6222bb6510c4ac3579193886c6595e12dc57b9dfb7"}, &(0x7f0000000040)=0x79) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) close(r2) 22:45:06 executing program 0: 22:45:06 executing program 5: 22:45:06 executing program 5: 22:45:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RLERROR(r1, &(0x7f0000000180)={0x1b, 0x7, 0x2, {0x12, '/dev/loop-control\x00'}}, 0x1b) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:06 executing program 0: 22:45:06 executing program 5: 22:45:06 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:06 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:06 executing program 5: 22:45:06 executing program 0: 22:45:06 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x45f}) rt_sigsuspend(&(0x7f0000000140)={0x54}, 0x8) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) socketpair(0xa, 0x4, 0x100, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000180)=""/94, &(0x7f0000000200)=0x5e) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) 22:45:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000040)={0xffffffff00000001, 0x5, 0xd2, 0x6, 0x3, 0x10001}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:06 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) write(r0, &(0x7f00000003c0)="36eddba59660fed0b37698761ca4d29ed3faa68d374a52951f7067240c5f0c68f403bbe8e1c76ebd5aceb6b3a9eb26260963cfac734a098bd7900531b9f11fddd5cb808e42d9d455a53a4e67a21c799337e0f0fb7b92d0182530f89369f9f08a66fc871499e227f5c6d6423e40a35801a7f2f1672ebe8c37d56dd8b9f999485f5199328ea0a9b50339f96d8f4e1edb1ce9dcd68b139f8b8fc226906e223cce9254d3ff8d9543870f29ca456ba5bd7b78a014c9b12ceb9785996796db1356e1344bc4be043561506607d54d5a01b8b1284e8e58f568868218810b9dacdb73698cf544abc5bb", 0xe5) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) 22:45:06 executing program 0: 22:45:06 executing program 0: 22:45:06 executing program 5: 22:45:06 executing program 5: 22:45:06 executing program 5: 22:45:06 executing program 5: 22:45:06 executing program 1: r0 = gettid() mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000000840)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000001c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f00000000c0)={0x81}) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000240)=0x40200000000001, 0x0) sched_getparam(r0, &(0x7f0000000200)) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:06 executing program 5: 22:45:06 executing program 0: 22:45:07 executing program 4: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000140)="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", 0xfe, 0xfffffffffffffffc) keyctl$setperm(0x5, r0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 22:45:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:07 executing program 0: 22:45:07 executing program 5: 22:45:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffcc6) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x48e01, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) r2 = getgid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000580)={0x7a, 0x7d, 0x2, {{0x0, 0x54, 0x8b, 0x1, {0x88, 0x4, 0x5}, 0x81010000, 0x800, 0xc5d0, 0xe2, 0x4, 'ppp0', 0xb, '-vboxnet1*#', 0x0, "", 0x12, '/dev/loop-control\x00'}, 0x11, "2c2e5c2f656d305d2f946367726f757088", r1, r2, r3}}, 0x7a) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$IP_VS_SO_SET_ADDDEST(r5, 0x0, 0x487, &(0x7f0000000180)={{0x5e, @multicast1, 0x4e22, 0x1, 'rr\x00', 0x2d, 0x1ff, 0x2b}, {@empty, 0x4e24, 0x2, 0x231b, 0x5}}, 0x44) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:07 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='bpq0\x00', 0x10) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") unshare(0x400) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1a, &(0x7f0000000040)={@local}, &(0x7f00000000c0)=0x20) 22:45:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:45:07 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) creat(&(0x7f00000001c0)='./file0\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) 22:45:07 executing program 5: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:45:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) 22:45:07 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000040)=0x8000) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000180)=0x1, 0xffffffffffffffd3) inotify_init1(0x0) creat(&(0x7f00000001c0)='./file0/file0\x00', 0x186) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:07 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/167, 0xa7) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:07 executing program 1: r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$TIOCMGET(r2, 0x5415, &(0x7f00000001c0)) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f0000000200)=r0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:07 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400, 0x0) 22:45:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') add_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)="1a1efaa9f211bacf10ffe91de1aa09b124898a4448c7201c631e26dde6d2ef44dce0adc62d2f8f244d5c82c26a286e85e28cabe9a77554795839c66b5dc1019b61015cc0be2132573a45873de60dc1e2", 0x50, r1) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:07 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000040)=0x8000) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000180)=0x1, 0xffffffffffffffd3) inotify_init1(0x0) creat(&(0x7f00000001c0)='./file0/file0\x00', 0x186) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:07 executing program 5: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='bpq0\x00', 0x10) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x801) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:07 executing program 4: r0 = dup(0xffffffffffffffff) write$selinux_create(r0, &(0x7f0000000000)=@access={'system_u:object_r:inetd_child_exec_t:s0', 0x20, 'unconfined', 0x20, 0x3}, 0x48) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 22:45:07 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400, 0x0) 22:45:07 executing program 5: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f00000001c0)) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000640)="00bbfd086810e44ef85ed6da5484d9a3fe59a12397b4d3ff3cb65b3bce4c4b233cd86cafae1b2496a3537fedc8d8c61b98984fe88a98a0f49de4b281c1a308a2c6d4b29cec044cc6c6c1cb9bafd6edc6c119941dc7b1afa69d94408e06b9534a3ed72116ee17ec9db74e72d10b5e0343119bd61a48b28d12f3c21690e3810157622bdf3f723499b2fe68000000000000000515da85e2dc883daf771f82d7a5", 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:07 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000480)={{0x89, @multicast1, 0x4e23, 0x3, 'wrr\x00', 0x10, 0x3ff, 0x43}, {@empty, 0x4e22, 0x10007, 0x7158, 0x7, 0x7cc0}}, 0x44) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000280)) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40046602, &(0x7f0000000300)=0x40) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40246608, &(0x7f0000000200)={0x5, 0x1, 0x9829, 0x8001, 0x4, 0x4}) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f00000001c0)) 22:45:07 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x800, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000001c0)) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendfile(r3, r4, 0x0, 0xfffffffffffffffc) sendfile(r3, r4, &(0x7f0000000040), 0xdff2) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x800) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000040)='./file0\x00', r2}, 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) memfd_create(&(0x7f0000000200)='/dev/loop-control\x00', 0x7) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:07 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 22:45:07 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='V\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000840)=""/214, 0xd6) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:07 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) fcntl$setstatus(r0, 0x4, 0x2800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_pts(0xffffffffffffff9c, 0x0) execveat(r1, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000440)=[&(0x7f0000000200)='\x00', &(0x7f0000000280)='nr0\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000340)='task\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='vmnet0\x00'], &(0x7f00000005c0)=[&(0x7f0000000480)="93", &(0x7f00000004c0)='*vmnet0\x00', &(0x7f0000000500)="93", &(0x7f0000000580)='nr0\x00'], 0x1400) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000180)=0x2) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) ioctl$FS_IOC_GETVERSION(r1, 0x80047601, &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x1, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:07 executing program 5: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) poll(&(0x7f00000001c0)=[{r0, 0x4044}, {r2, 0x4000}], 0x2, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:07 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x400) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x800, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000040)={0x33, 0x6, 0x0, {0x4, 0x2, 0xa, 0x0, '/dev/zero\x00'}}, 0x33) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f00000001c0)=""/4096, 0x1000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000011c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000001300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80200004}, 0xc, &(0x7f00000012c0)={&(0x7f0000001200)={0x84, r2, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7a}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x985}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x8084}, 0x4000800) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) 22:45:07 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$TCSETAW(r0, 0x5407, &(0x7f00000001c0)={0xffffffff, 0x100000001, 0x8, 0xffffffffffffffff, 0x84, 0x7fffffff, 0x1, 0x5, 0x2, 0x4}) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:07 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000480)={{0x89, @multicast1, 0x4e23, 0x3, 'wrr\x00', 0x10, 0x3ff, 0x43}, {@empty, 0x4e22, 0x10007, 0x7158, 0x7, 0x7cc0}}, 0x44) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000280)) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40046602, &(0x7f0000000300)=0x40) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40246608, &(0x7f0000000200)={0x5, 0x1, 0x9829, 0x8001, 0x4, 0x4}) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f00000001c0)) 22:45:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000180)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000040)={0xbe5, 0x8000, 0x0, 0x0, 0x0, 0x3, 0xea, 0x9, 0x5711, 0x2f9}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) 22:45:08 executing program 0: gettid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000280)="166a4ed85ea0cc52cde3135f7988a73d1aa0dbec6da324f3bbd730d08479576e0304fa8032", 0x25}, {&(0x7f0000000300)="e62a6520d54a3724697718a61575d78762a281d7e6eb17a43c9a6f5bc86851", 0x1f}, {&(0x7f0000000400)="81c2d802d971f93c9756a12ef90c10efd656403009e9bcf623b217790287a22d0955f850024c8b9d9c2bbeeabb5cad4afb61c07a3344e21d4ec3928869f86dc3c7d0ca689a458499510ce453f2106d7f8245ef789a85b8b64884c8561bb97748", 0x60}, {&(0x7f0000000640)="18f31328e25dd07bf659ad43bf84f7accf9d56db111b73629e12a622be9f1c61cb0fd40338576414ede9f1dfb0c77bc022d9603b5c8f7380917cb4f19a39e32f6825154a33374e2b66ece33e7ff7ee628885", 0x52}, {&(0x7f0000000480)="8ffc062669691d572f676f4d54b3df76fed833fef94fb4602fa573d64be2c44a47025abf7a5b6e953bbcdceae2aa", 0x2e}, {&(0x7f0000000840)="ab55449fd76498edbc97606def6e9b763ab9df789a5803df20848e314defc54ba3938d4319b6a03a4482ee006dd36cb7c3c170f2f9c1c155fbed908a6171caa670fe52de2113fc61b737524392bb61a5b10f9c024c4e4f9689b0928cb8b7346f728cab5f5bc94edde9758a1fd0431c7805ed97f1b2085f4c72a254a69b10b9446faa09ceb2c7014836265dd7c2380fe403c4c0b323ebd1c4", 0x98}, {&(0x7f0000000900)="b87a77d7e4b7c8f4e7cf61fc352ff427e3503f5ce363c9733f21d6f9d2803b96c2bef3ef7354721fabb4ba4b20bf927047e433ec36978b10a90ca955b45b076eebc618418c88eca32f698943f633bb87f169657ca6b867814db1011b8dad0d5926e59fb3150564b900f3bb45d4c18b9649b498a59b06da523aa91205ddb123ad8fee5e7d4b6fa367716c069853f75276b447b7", 0x93}, {&(0x7f00000009c0)="4460e010fcca00b3cd2a2c1b0eae592566e563add1f291da7445ff8d656b4bd8739e72c44c781d37016e76ac09d408ba27e72465efcf267d75c837c952278f38dbde8740bb4b10b6eb4efb180cdb731a34e6a302a1deb68da2ac3d6392336c5be9ac9071dfd056418628aa625fd43aa3ee801c616ee73384f1acd79a97c59a774031ec549229cd00988e6c68e99068c8b6bc83aca1583fc1f9d51c7a753c743bab8ed823fc2cb273d786", 0xaa}, {&(0x7f0000000a80)="90bcb18ee4beedcb2d4d612aa5c5c6d733b5ee27fe495228296058feca5cf4a1bce1bba651722c62c8974ecfe6ba62412e269697e16df28df4280429b0ab94e7cff4c66dc736782809f33f39a950381dee7951960dd18fc33600c245a72a93bdb616d1a83daf94712b6f748a180cf06556b1b3e4e141d2430cae6ec456ef02c6fe16a11d1376d65d3935b5976f5de547800fc29a9f817c68cef0ab0ca615268f9ecb23c61ef73ee1f59092a4ecbccf85c49e348a26e065c3f6daa41d2c0dae2e39a46aaec7ce", 0xc6}], 0x9, &(0x7f0000000500)=[@rights={0x28, 0x1, 0x1, [r0, r2, r4, r0, r2, r4, r4]}], 0x28, 0x40000}, 0x40800) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 5: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)={0x8}) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0xb0, r2, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x84f0fa0}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffffffffffff}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x5}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xffff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3c35}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4004004}, 0x40000) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) pread64(r0, &(0x7f0000000180)=""/72, 0x48, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000480)={{0x89, @multicast1, 0x4e23, 0x3, 'wrr\x00', 0x10, 0x3ff, 0x43}, {@empty, 0x4e22, 0x10007, 0x7158, 0x7, 0x7cc0}}, 0x44) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000280)) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40046602, &(0x7f0000000300)=0x40) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40246608, &(0x7f0000000200)={0x5, 0x1, 0x9829, 0x8001, 0x4, 0x4}) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f00000001c0)) 22:45:08 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='cpuset\x00') ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/187) rt_sigtimedwait(&(0x7f0000000000)={0xaf}, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000380)=0xe8) ioctl$TUNSETOWNER(r0, 0x400454cc, r2) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000140)={0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000280)={@dev={0xfe, 0x80, [], 0x15}, 0x1, 0x3, 0x2, 0x2, 0xd09, 0xc9}, 0x20) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) write$tun(r0, &(0x7f00000004c0)={@void, @void, @arp=@generic={0x307, 0x8914, 0x6, 0xb, 0x1, @broadcast, "01ce6f6629440c02d732b0", @broadcast, "c54772b8da1508c252a12bf89a6f5662"}}, 0x2f) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 22:45:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000180)=0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f00000001c0)={0x3, 0x8}) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0xb0, r2, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x84f0fa0}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffffffffffff}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x5}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xffff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3c35}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4004004}, 0x40000) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) pread64(r0, &(0x7f0000000180)=""/72, 0x48, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = dup3(r0, r0, 0x80000) r3 = mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000004, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000001c0)={0x68, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="03630840", @ANYRES64=r3, @ANYBLOB="0463044002000000056304400400000001634040030000000000000001000000000000000000000001000000000000000000000020000000000000003000000000000000", @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYBLOB="8561646600000000010000000000fdff02000000000000000a00000000000000"], @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYBLOB='x\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0763044003000000"], 0x50, 0x0, &(0x7f0000000140)="8a4a3f99074b957bbeae6758df2f528d59c3ad723f0e582ed629f0c7c25839bc43dfaff2e97b2f76e62787a7066a1e20e3609e4a1b5f4515c1bd0229d85abafe07cf520d47401094d3aef000d80ebb87"}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 22:45:08 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = dup3(r0, r0, 0x80000) r3 = mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000004, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000001c0)={0x68, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="03630840", @ANYRES64=r3, @ANYBLOB="0463044002000000056304400400000001634040030000000000000001000000000000000000000001000000000000000000000020000000000000003000000000000000", @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYBLOB="8561646600000000010000000000fdff02000000000000000a00000000000000"], @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYBLOB='x\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0763044003000000"], 0x50, 0x0, &(0x7f0000000140)="8a4a3f99074b957bbeae6758df2f528d59c3ad723f0e582ed629f0c7c25839bc43dfaff2e97b2f76e62787a7066a1e20e3609e4a1b5f4515c1bd0229d85abafe07cf520d47401094d3aef000d80ebb87"}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 22:45:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x7, &(0x7f0000000180)=[{0x3, 0x4}, {0x5, 0x401}, {0x1, 0x47d93bc7}, {0x13, 0x3a}, {0x687, 0x3}, {0xb143, 0x8}, {0x8, 0xfffffffffffffff8}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') ioctl$TCSBRK(r0, 0x5409, 0x3) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040), 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x1003}) 22:45:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x8, &(0x7f0000000180)={0x3}) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000180)={0xdf76, 0x7f, 0x2, 0x0, 0x0, [{r0, 0x0, 0x7}, {r1, 0x0, 0x8}]}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000200)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f00000003c0)) execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000280)="8514f6894950565301864f9c9967fe83dbfe0419e795e4f049ecd5e00598a01ec85bd05a498e9b13b91283097e2b79a97795a1072a8dffc31ee394340ab562eaccca2b3624c5607e4d1a753e498c5b7408d56fe75d78d5acbecdae5ccc2cd0dfdda905e515619de07362af1a0f202b2da1acda53d740b2bc81", &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) ioctl$KDSKBLED(r4, 0x4b65, 0x6) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000140)) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 5: r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540), &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000001c0)=0x7fffffff) syz_open_procfs(0x0, &(0x7f0000000200)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) sched_getscheduler(r0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$setown(r2, 0x8, r0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x20000, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) 22:45:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r0, 0x0, 0xa, &(0x7f0000000180)='syzkaller\x00', 0xffffffffffffffff}, 0x30) r3 = gettid() r4 = syz_open_procfs(r3, &(0x7f0000000380)='task\x00') setuid(0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000340)={0x5, &(0x7f00000002c0)=[{0x5, 0x100000000, 0x81, 0x7ff}, {0x80000000, 0x0, 0xab, 0x411}, {0x5, 0x9, 0xff, 0x1}, {0x401, 0x693, 0x0, 0x1}, {0xce, 0x9, 0x6, 0x7fff}]}, 0x8) sendmsg$IPVS_CMD_SET_SERVICE(r4, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x84, r5, 0x600, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x28}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x10}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x84}, 0x1, 0x0, 0x0, 0x20004010}, 0x4000000) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r3, r4, 0x0, 0x1, &(0x7f0000000200)="93", r2}, 0x30) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 4: gettid() r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f00000001c0)) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$EVIOCGBITSW(r4, 0x80404525, &(0x7f0000000840)=""/253) 22:45:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffff7a, 0x10020, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') keyctl$negate(0xd, r1, 0x1, r1) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 0: r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x100, 0x2, 0x0, 0x7fffffff, 0x0, 0x2, 0x80001, 0x1, 0x6, 0xff, 0x2, 0x7, 0x5, 0x7, 0x31241446, 0x401, 0xffffffffffffffdc, 0x7, 0x800, 0x1f, 0x401, 0x9, 0x6, 0xffffffff80000000, 0xfda2, 0x401, 0x4c34, 0x64, 0x6, 0x6, 0x7ff, 0x6b7, 0x0, 0x1, 0xff, 0xee, 0x0, 0x8, 0x1, @perf_config_ext={0x2, 0x400}, 0x40, 0x6, 0x1, 0x7, 0x6, 0x3, 0x6}, r0, 0xc, r1, 0x8) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = syz_open_procfs(r0, &(0x7f0000000400)='net/icmp\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000240)=0x1, 0x3) ioctl$TIOCSCTTY(r4, 0x540e, 0x500) write$selinux_validatetrans(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a64656661756c745f743a73302073797374656d5f753a6f626a6563745f723a7379736c6f675f636f6e665f743a7330203030303030303030303030303030303032303438202f7573722f7362696e2f637570732d62726f77736564001148d7bd8afd7f5b9af7b2609e556ecd73fe3df31268"], 0x6e) getsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000280)={@broadcast}, &(0x7f0000000380)=0xc) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000300)) write$P9_RREMOVE(r4, &(0x7f0000000000)={0x7, 0x7b, 0x2}, 0x7) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 5: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) symlinkat(&(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./file1\x00') ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x8000, 0x1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = memfd_create(&(0x7f0000000240)="2f6465762f7a65726f000c27515729650876d2b0f6384b355ad789d7a5c23acfba27f9bd6fb58138dc75647542aa56730345c6f035da318cd09b28c05b9affc2b7fa2efba471e6824e53b31a2c9a20033b418b7a881899b78b61cb3d5d187717c5354766ecc3bfd05e1e218e1a18c1", 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.nlink\x00', &(0x7f0000000140)=""/255, 0xff) listen(r1, 0x260) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xb9) getgroups(0x5, &(0x7f0000000400)=[0xee00, 0x0, 0xffffffffffffffff, 0x0, 0x0]) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x8b0800, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0x9}}], [{@smackfshat={'smackfshat', 0x3d, 'mime_type\'@'}}]}}) 22:45:08 executing program 1: gettid() r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) pread64(r0, &(0x7f0000000400)=""/152, 0x98, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x17) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffff7a, 0x10020, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') keyctl$negate(0xd, r1, 0x1, r1) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 5: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) symlinkat(&(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./file1\x00') ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:08 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setrlimit(0x0, &(0x7f00000003c0)={0xfffffffffffffff7}) read(r0, &(0x7f0000001580)=""/4096, 0x1000) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff}) rename(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x2, 0x10) ioctl$TUNGETFILTER(r2, 0x800854db, &(0x7f0000000500)=""/37) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)=""/242, 0xf2}, {&(0x7f0000000040)=""/143, 0x8f}, {&(0x7f0000000240)=""/64, 0x40}], 0x3, 0x0, 0x0, 0x20}, 0x1) getsockopt$inet6_buf(r2, 0x29, 0xcc, &(0x7f0000000540)=""/4096, &(0x7f0000001540)=0x1000) r3 = gettid() pwrite64(r1, &(0x7f0000000400)="4ffe8bbc0149190706741e0e89efcb6ecb055b582fea28b7ffb97b5cb44273d3f4cccc650a2db5d5c4fe48db0bac1f0b995a01ba157b4055c619853e0a7241b8d58a06e28964995a21c894bc8c763357e3d0bb0f7b311ae65919b78327acffa2c890d918404169662829c0a61fca708a6f4088536bab1aff50a0483c3cc9d39cb2b89f1d44f7fcea", 0x88, 0x0) ioprio_get$pid(0x0, r3) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000380)='veth0_to_bond\x00') 22:45:09 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) openat$random(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') prctl$getname(0x10, &(0x7f00000008c0)=""/4096) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:09 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e21, 0x200, @mcast2, 0x5}, {0xa, 0x4e20, 0x3e5, @remote, 0x7}, 0x200, [0xfc0000000000, 0x4, 0x10, 0x200, 0x7fffffff, 0x76fd, 0x0, 0x8]}, 0x5c) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000140)='ns/cgroup\x00') 22:45:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffff7a, 0x10020, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') keyctl$negate(0xd, r1, 0x1, r1) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:09 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000640)={'nat\x00', 0x0, 0x4, 0xbd, [], 0x2, &(0x7f00000001c0)=[{}, {}], &(0x7f0000000400)=""/189}, &(0x7f0000000200)=0x50) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:09 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680)={'\x00', 0x0}, &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:09 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x82040, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f0000000140)={0xdecf, {{0xa, 0x4e20, 0xffffffff, @empty, 0xc000000000000}}}, 0x84) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) ioctl$TIOCNOTTY(r3, 0x5422) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x0) getsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000080)=""/81, &(0x7f0000000200)=0x51) 22:45:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x509000, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffff7a, 0x10020, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') keyctl$negate(0xd, r1, 0x1, r1) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000280)=""/84) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) timer_create(0x7, &(0x7f0000000140)={0x0, 0x2c, 0x2, @tid=r2}, &(0x7f0000000180)) write$P9_RMKNOD(r0, &(0x7f00000001c0)={0x14, 0x13, 0x1, {0x0, 0x2, 0x8}}, 0x14) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000200)={'gretap0\x00', {0x2, 0x4e24}}) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:09 executing program 0: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) openat$random(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x40000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') prctl$getname(0x10, &(0x7f00000008c0)=""/4096) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:09 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) dup3(r1, r0, 0x80000) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x200) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f00000001c0)=""/106) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') r4 = getpid() ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000040)=r4) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x2000}) 22:45:09 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x80000, 0x0) ioctl$TUNATTACHFILTER(r1, 0x400854d5, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80008001}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r3, 0x308, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x101}]}, 0x24}}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x0) 22:45:09 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000180)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:09 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:09 executing program 0: r0 = socket$packet(0x11, 0x2003, 0x300) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000011c0)={'filter\x00', 0x0, 0x3, 0xa, [], 0x0, &(0x7f0000000040), &(0x7f0000001100)=""/10}, &(0x7f0000001140)=0x50) recvfrom$packet(r0, &(0x7f00000000c0)=""/4096, 0x1000, 0x0, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000001280)="792775e94419e838a67a906c4cdc93f4a4d572d4bfec92e1231dd5f9064b7474a7704021bd0c7fe8e6cfb15521f67a91c8cc764a7b62de1cd44623fc2f9c241cc61e3f", 0x43, 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, r2, 0x1) r3 = socket$inet6(0xa, 0x20100000000006, 0x10003) sendto$inet6(r3, &(0x7f00000002c0), 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @remote}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000001180)=0x2, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8906, &(0x7f0000001240)={"626f6e645f7391a576655f30000f00"}) 22:45:09 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x141401, 0x0) sendto$inet(r0, &(0x7f0000000040)="2fc2f8", 0x3, 0xc000, &(0x7f0000000080)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000000c0)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@nat={'nat\x00', 0x19, 0x3, 0x3f8, [0x20000140, 0x0, 0x0, 0x200003d0, 0x20000400], 0x0, &(0x7f0000000100), &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x7, 0x15, 0xfbff, 'ip_vti0\x00', 'ip6_vti0\x00', 'veth0_to_bridge\x00', 'ip_vti0\x00', @random="6a21a59e69b8", [0x0, 0x0, 0xff, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0x0, 0x0, 0x0, 0x0, 0xff, 0xff], 0x118, 0x148, 0x178, [@rateest={'rateest\x00', 0x3c, {{'eql\x00', 'syz_tun\x00', 0x21, 0x3, 0x81d, 0xff, 0x3, 0xe7d, 0x3, 0x6}}}, @nfacct={'nfacct\x00', 0x24, {{'syz0\x00', 0xfffffffffffffffe}}}]}, [@arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xfffffffffffffffd}}}]}, @arpreply={'arpreply\x00', 0xc, {{@empty, 0x85104812ac8caf5e}}}}, {{{0x19, 0x67, 0x883f, '\x00', 'eql\x00', 'ip6tnl0\x00', 'sit0\x00', @random="f279e69cf3be", [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @random="96947d874b51", [0xff, 0x0, 0xff, 0x0, 0xff], 0x70, 0xb8, 0xe8}, [@common=@log={'log\x00', 0x24, {{0x4, "81f94991deb5e8acbd062c4090d6746fb9a774fbdb0cfbfbed10017ec503"}}}]}, @arpreply={'arpreply\x00', 0xc, {{@empty, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x200, 'eql\x00', 'lo\x00', 'veth0_to_bond\x00', 'bpq0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0xff, 0x0, 0xff, 0x0, 0xff], @local, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0xa8, 0xa8, 0xd8, [@statistic={'statistic\x00', 0x14, {{0x1, 0x1, 0x10000, 0x6, 0x40, 0x5}}}]}}, @snat={'snat\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff}]}, 0x448) ioctl$void(r0, 0x5451) readlinkat(r0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)=""/177, 0xb1) getdents(r0, &(0x7f00000006c0)=""/58, 0x3a) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000700)=0x3, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x3, &(0x7f0000000740), &(0x7f0000000780)=0x4) lremovexattr(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)=@random={'osx.', "e72576626f786e657431256c6f766d6e657431257573657273797374656d73656c696e75782600"}) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000840)={'ip6gre0\x00', 0x3}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000880)=r0, 0x4) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f00000008c0)={'veth1_to_bridge\x00', 0x9}) renameat(r0, &(0x7f0000000900)='./file0\x00', r0, &(0x7f0000000940)='./file0\x00') r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/policy\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f00000009c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000b40)=0xe8) quotactl(0x7, &(0x7f0000000a00)='./file0\x00', r2, &(0x7f0000000b80)="449a9ccbb0d5a2ad98560c82f7a2b6773b1e6a8664d4c6e8e14fa03f94a35a9972cfbe4b5fe0e10e285660ef79b4e349ead8ad2e10950b88495c279b49f1456a9f76cbee83c4df280a84124f1851ace7a0e379982aef0300b5f035d2771c3d37e122c8cd92d4bb3101d05766c608a429c35aeb06bd1612a10ffb5710e426378c4453ab8271733d44b599c4545c91705321f2abb8b0968c517285c35f0801610291ff419d1f61891ca2e5c3d30f696178fc5070afde889f2dfe4bce6f") ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000c40)=""/79) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000cc0)='cubic\x00', 0x6) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000d40)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000e00)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d80)={0x2c, r3, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000e40)={0x0, 'veth1_to_team\x00'}, 0x18) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000e80)={0x4, 0x7fff, 0x81, 0x1f, 0xfffffffffffffbff, 0x800, 0x465, 0x8000, 0x3, 0x8, 0xaaa, 0x5b39}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000ec0)={{{@in6=@ipv4={[], [], @multicast2}, @in=@local}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000fc0)=0xe8) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40046607, &(0x7f0000001000)=0xfffffffffffffffb) write(r0, &(0x7f0000001040)="87747b147b9cd82c232d3627", 0xc) fcntl$getownex(r0, 0x10, &(0x7f0000001080)) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000010c0)='trusted.overlay.origin\x00', &(0x7f0000001100)='y\x00', 0x2, 0x1) write$selinux_load(r0, &(0x7f0000001140)={0xf97cff8c, 0x8, 'SE Linux', "dd18e505758f6d12e4b6790368c222822cb77d951624d5382e2a7ace417f4c47126ef484da83b0e53471b4749445e212a7600399bbcdee86a4e119e2e243b2b2d2062aa55dd18f503c6881949f8385a86c08bd4c178d3aa595c9a8e66d122a1efed32ef83b1b3379c4f5d1f1b0c24bc83ebbfe0d02c3b1b0db698d6452d7a1e0b7bc0c6bc8ddf3f2186c44"}, 0x9b) 22:45:09 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000240)={0x0, r1}) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, r3, 0x200, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xc0}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xf7}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x1) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) r4 = inotify_init1(0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r4) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) 22:45:09 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0xfffffe96, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x6, 0x20000, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000180)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) 22:45:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$KDENABIO(r0, 0x4b36) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80002}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=@ipv4_newaddr={0x6c, 0x14, 0x422, 0x70bd2b, 0x25dfdbff, {0x2, 0x38, 0x2, 0x0, r3}, [@IFA_FLAGS={0x8, 0x8, 0x4}, @IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_BROADCAST={0x8, 0x4, @multicast1}, @IFA_CACHEINFO={0x14, 0x6, {0xd03e, 0x90a, 0x5, 0xffff}}, @IFA_ADDRESS={0x8, 0x1, @loopback}, @IFA_FLAGS={0x8, 0x8, 0x100}, @IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_ADDRESS={0x8, 0x1, @multicast2}, @IFA_ADDRESS={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0xf}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x850}, 0x50) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) setsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f0000000180)="09b8e6dad00b7cbfb05a86e660724275266056190139857e8549d08c7a3ecf796000271fe7af0852a19c07b8e6e89f65fcd2a8ff5da5fb53a761b51036914f77a7cfb165712daa656e4144e53777a8a1b9479ff5f2f2addb37d4ac77772aff3109686e3ca9ef5c091713517ce44024f0ae5f305a44ff6dd0cdefd71c26379754f79c3fedee4ecc50fe3618ab3afe0856e8d4886b9bf3d3e821e0fe01e6127d05bb7acca9f64b189b03e61a69fa6f9f54ea", 0xb1) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:09 executing program 1: gettid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockname$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000640)={@broadcast, @local}, &(0x7f0000000680)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000900)={{{@in=@dev, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000a00)=0xe8) getsockname(r2, &(0x7f0000000a40)=@hci, &(0x7f0000000ac0)=0x80) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@rand_addr, @in=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000cc0)=0xe8) getpeername$packet(r1, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000d40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000d80)={{{@in6=@local, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000e80)=0xe8) getsockopt$inet_mreqn(r2, 0x0, 0x0, &(0x7f0000000ec0)={@broadcast, @multicast2}, &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000003f00)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000004000)=0xe8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000004040)={0x0, @dev, @remote}, &(0x7f0000004080)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000009480)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000009580)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000009600)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000009640)={{{@in6=@local, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000009740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000009780)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000009880)=0xe8) getpeername$packet(r1, &(0x7f00000098c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000009900)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000009940)={{{@in=@broadcast, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@mcast2}}, &(0x7f0000009a40)=0xe8) getpeername$packet(r2, &(0x7f0000009ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009b00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000009b40)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@loopback}}, &(0x7f0000009c40)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f000000a340)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80800}, 0xc, &(0x7f000000a300)={&(0x7f0000000f40)={0xffffffffffffff7c, r4, 0x60b, 0x100070bd29, 0x25dfdc00, {}, [{{0x0, 0x1, r7}, {0x0, 0x2, [{0x0, 0x1, @user_linkup={{{0x0, 0x1, 'user_linkup\x00'}}, {0x0, 0x6, r5}}}, {0x0, 0x1, @lb_tx_method={{0x0, 0x1, 'lb_tx_method\x00'}, {}, {0x0, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x0, 0x1, r6}, {0x0, 0x2, [{0x0, 0x1, @lb_tx_hash_to_port_mapping={{{0x0, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {}, {0x0, 0x4, r5}}}}, {0x0, 0x1, @name={{0x0, 0x1, 'mode\x00'}, {}, {0x0, 0x4, 'broadcast\x00'}}}, {0x0, 0x1, @lb_tx_method={{0x0, 0x1, 'lb_tx_method\x00'}, {}, {0x0, 0x4, 'hash\x00'}}}]}}]}, 0x664}}, 0x800) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) 22:45:09 executing program 0: unshare(0x2000600) unshare(0x2000400) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f00000000c0)=""/56) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x145c82, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)={0x10dc, 0x34, 0xf22, 0x70bd2b, 0x25dfdbfe, {0xd}, [@generic="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", @generic="c97c23bab134a3e22774", @nested={0xbc, 0x3f, [@generic="6f79f687606c738c0b96bc185d31769564fb10a03756d1f51b2bb7fd7dbcb38cbf28efa0683b09e0324a9c75f3", @typed={0x8, 0x81, @uid=r3}, @generic="d16650c8add57dadeb86f816ee2166f6d12c8dbae7bac6fd4ab61b828c98733f69760ee305bd824fc0a6f626a53e8550476267a64d70c9dc1e4f10c317cb308b15575bc55f81f3e8955279b17e5af21a148bb1373b731fbb2bf94eec48fe3c21c3e8d08e7f5fedcb54c6bfbd0dca6c437c34b6286894dca5c89559d654c641a548"]}]}, 0x10dc}, 0x1, 0x0, 0x0, 0x4040}, 0x48090) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='personality\x00') ioctl$RTC_EPOCH_SET(r4, 0x4004700e, 0x7fff) fstat(r1, &(0x7f0000000540)) socketpair(0x1f, 0xf, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCMBIC(r5, 0x5417, &(0x7f0000000040)=0x400) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0e05403, &(0x7f00000002c0)={{0x2, 0x3, 0x4, 0x3, 0x8}, 0x8, 0x996, 'id1\x00', 'timer0\x00', 0x0, 0x3e, 0x2, 0x7ff, 0x3}) r6 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r6, &(0x7f00000003c0)='ns/ipc\x00') 22:45:09 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) write$binfmt_aout(r0, &(0x7f00000008c0)={{0x1cf, 0x5, 0xa487, 0x291, 0x8b, 0x8001, 0x2f0, 0x8}, "95f1642ea136338d1284296e4b8bf785889228695efdab21755cdf", [[], [], [], [], [], [], [], [], []]}, 0x93b) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000080)=0x4) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x280, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000180)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:09 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0x19, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0xffffffffffffffff}, 0x30) capget(&(0x7f00000000c0)={0x200f1526, r1}, &(0x7f0000000100)={0x0, 0x7, 0x6, 0x100, 0x100000001, 0x7ff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r2, r0, 0x0) 22:45:09 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f00000001c0)=0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) readv(r1, &(0x7f0000001ac0)=[{&(0x7f00000003c0)=""/166, 0xa6}, {&(0x7f0000000280)=""/102, 0x66}, {&(0x7f00000008c0)=""/243, 0xf3}, {&(0x7f0000000480)=""/187, 0xbb}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000000340)=""/48, 0x30}, {&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/227, 0xe3}, {&(0x7f0000000740)=""/87, 0x57}], 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f0000000180)=0x1e) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$dupfd(r0, 0x0, r2) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000004c0)={0x1f, {{0xa, 0x4e21, 0x4, @ipv4={[], [], @rand_addr}, 0x100000000}}}, 0x84) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x165c, 0x80000001, 0x5, 0xffff, 0x81, 0xfffffffffffffd2b, 0x7, 0xf7a2}, &(0x7f00000003c0)={0x1, 0x800, 0x9, 0x50f, 0x5, 0x5, 0x2}, &(0x7f0000000400)={0x8, 0x9, 0x5, 0x8, 0xc, 0x9, 0x9, 0x4}, &(0x7f0000000480)={r2, r3/1000+10000}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f00000000c0)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="300000001000010800a96dcaf83ecf73adaf3fa41fdb000000002000000000000006bb7af81a212995591e211739bc9efb0ce11bd66ceeb9", @ANYRES32=0x0, @ANYBLOB="0000000000f4000008001b010000000008000400f0ffc500d9ac52903c68bb4284fae78bb09a16ecd779300200fdcf5b7ea7588100000000000000"], 0x30}}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$sock_ifreq(r0, 0x89df, &(0x7f0000000100)={'lo\x00', @ifru_addrs=@vsock={0x28, 0x0, 0xffffffff, @host}}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001640)=0x14) r6 = getpgid(0x0) capset(&(0x7f0000000580)={0x19980330, r6}, &(0x7f00000005c0)={0x8, 0xfffffffffffff000, 0xffffffffffffa72e, 0x3, 0x1, 0x1f8}) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000001680)={@local, @empty, @local, 0x401, 0xb8, 0x450, 0x100, 0x2, 0x1080001, r5}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x1ff) r7 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r7, 0x80404509, &(0x7f0000000200)=""/242) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 22:45:10 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000004c0)={0x1f, {{0xa, 0x4e21, 0x4, @ipv4={[], [], @rand_addr}, 0x100000000}}}, 0x84) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x165c, 0x80000001, 0x5, 0xffff, 0x81, 0xfffffffffffffd2b, 0x7, 0xf7a2}, &(0x7f00000003c0)={0x1, 0x800, 0x9, 0x50f, 0x5, 0x5, 0x2}, &(0x7f0000000400)={0x8, 0x9, 0x5, 0x8, 0xc, 0x9, 0x9, 0x4}, &(0x7f0000000480)={r2, r3/1000+10000}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f00000000c0)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="300000001000010800a96dcaf83ecf73adaf3fa41fdb000000002000000000000006bb7af81a212995591e211739bc9efb0ce11bd66ceeb9", @ANYRES32=0x0, @ANYBLOB="0000000000f4000008001b010000000008000400f0ffc500d9ac52903c68bb4284fae78bb09a16ecd779300200fdcf5b7ea7588100000000000000"], 0x30}}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$sock_ifreq(r0, 0x89df, &(0x7f0000000100)={'lo\x00', @ifru_addrs=@vsock={0x28, 0x0, 0xffffffff, @host}}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001640)=0x14) r6 = getpgid(0x0) capset(&(0x7f0000000580)={0x19980330, r6}, &(0x7f00000005c0)={0x8, 0xfffffffffffff000, 0xffffffffffffa72e, 0x3, 0x1, 0x1f8}) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000001680)={@local, @empty, @local, 0x401, 0xb8, 0x450, 0x100, 0x2, 0x1080001, r5}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x1ff) r7 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r7, 0x80404509, &(0x7f0000000200)=""/242) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 22:45:10 executing program 5: syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x810, r0, 0x1a) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$TCXONC(r1, 0x540a, 0x1) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) [ 677.099633] netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. [ 677.118868] netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. 22:45:10 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r0, 0x407, 0x5) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = request_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='/dev/zero\x00', 0xfffffffffffffff9) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000280)='encrypted\x00', &(0x7f00000002c0)='syzkaller\x00') execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x2f, &(0x7f0000000040)={@dev={0xac, 0x14, 0x14, 0x10}, @broadcast, @broadcast}, 0xc) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x400000000000002e, &(0x7f0000000000)={0x6, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @local}}}, 0x104) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f00000001c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @local}}}, 0x104) getsockopt$inet6_buf(r4, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf8) r5 = getpgid(0xffffffffffffffff) sched_setparam(r5, &(0x7f0000000440)=0x81) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='net/dev_mcast\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, r3) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) [ 677.187862] netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. 22:45:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000004c0)={0x1f, {{0xa, 0x4e21, 0x4, @ipv4={[], [], @rand_addr}, 0x100000000}}}, 0x84) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x165c, 0x80000001, 0x5, 0xffff, 0x81, 0xfffffffffffffd2b, 0x7, 0xf7a2}, &(0x7f00000003c0)={0x1, 0x800, 0x9, 0x50f, 0x5, 0x5, 0x2}, &(0x7f0000000400)={0x8, 0x9, 0x5, 0x8, 0xc, 0x9, 0x9, 0x4}, &(0x7f0000000480)={r2, r3/1000+10000}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f00000000c0)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="300000001000010800a96dcaf83ecf73adaf3fa41fdb000000002000000000000006bb7af81a212995591e211739bc9efb0ce11bd66ceeb9", @ANYRES32=0x0, @ANYBLOB="0000000000f4000008001b010000000008000400f0ffc500d9ac52903c68bb4284fae78bb09a16ecd779300200fdcf5b7ea7588100000000000000"], 0x30}}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$sock_ifreq(r0, 0x89df, &(0x7f0000000100)={'lo\x00', @ifru_addrs=@vsock={0x28, 0x0, 0xffffffff, @host}}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001640)=0x14) r6 = getpgid(0x0) capset(&(0x7f0000000580)={0x19980330, r6}, &(0x7f00000005c0)={0x8, 0xfffffffffffff000, 0xffffffffffffa72e, 0x3, 0x1, 0x1f8}) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000001680)={@local, @empty, @local, 0x401, 0xb8, 0x450, 0x100, 0x2, 0x1080001, r5}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x1ff) r7 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r7, 0x80404509, &(0x7f0000000200)=""/242) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 22:45:10 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) write$P9_RLCREATE(r1, &(0x7f00000001c0)={0x18, 0xf, 0x1, {{0x63}, 0x4}}, 0x18) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) sendto$unix(r3, &(0x7f0000000840)="b40cd8ba8dc53110854d35657d104b9fd7f375dcaa32bbdc2a8c01036229a6852da1cc8f647065841c0708f5f7de53935293737af7c95bb791c4ccd6fe8506d94e4eb8a025f3206f727721cf49d88600b93b43dc26a94079b32bd39280495b1b248dc19b143e457decffe5f547b7edc21827e87d44879ca97c56dd7dd61b21e1609c606f12065f065aee9b32b18f0217774a5b3fbab2efcafe167d6018d88335409b9b210b1613e3a2ede04818ad85ba6a3a53de933715f6a96264b8ee395bc8e52138003d4c0dbeb602fc5c4d74fdce3237c1180eeb37ae83225a07bc90b297022cf0dc6ff877962dd0a6e0875ba5cb155a2c57", 0xf4, 0x4, 0x0, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000180)={0x27f, &(0x7f00000001c0)=[{0xfffffffffffffffe, 0x3}, {0x3, 0x7}, {0xfffffffdfffffb2f, 0x3ff}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80047601, &(0x7f00000002c0)) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_names\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') r2 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockname$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000400)={@remote, 0x0}, &(0x7f0000000440)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40005400}, 0xc, &(0x7f0000000480)={&(0x7f00000008c0)={0xdc, r2, 0x100, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0xc0, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7f}}, {0x8}}}]}}]}, 0xdc}}, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:10 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x40001, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e20, @local}}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz0\x00', {0x2, 0x4000000000, 0x5, 0xb4}, 0x12, [0xfffffffffffffff8, 0x8001, 0xffffffffffff8000, 0x8a15, 0x0, 0x9, 0x7f, 0x8000, 0xff, 0x587, 0x2, 0x40, 0x7, 0x81, 0x6, 0x5, 0x101, 0x1f, 0x8, 0x1, 0x5, 0x3, 0x80000001, 0x7fffffff, 0xffff, 0x2, 0x10001, 0x3, 0x6, 0x0, 0x40, 0x3, 0x8, 0x3, 0x5, 0x1, 0x100000000, 0xd03, 0x3ec6, 0x3f, 0xfffffffffffffff8, 0x0, 0x6, 0x2, 0x5, 0x2, 0x101, 0x7, 0x6, 0x3, 0x8, 0x81, 0x5, 0x2, 0x8966, 0x5, 0x0, 0x0, 0x7, 0x3, 0x10000, 0x0, 0x7, 0x4], [0x40, 0x5, 0x7f, 0x6, 0x5, 0x40, 0x6, 0x80000000, 0xffffffffffffe43e, 0xd0, 0x800, 0x3ff, 0xe, 0x80000001, 0xffffffff, 0x401, 0x4, 0x8, 0x8, 0xffffffffffffff9e, 0x100, 0x5, 0x8, 0x0, 0x6, 0x3, 0x5, 0x6, 0x7, 0x9, 0x8, 0x2, 0x10001, 0x0, 0x3ff, 0x1, 0x8, 0x3, 0x8, 0x78, 0x3f, 0x400, 0xdeb, 0x3, 0x80000000, 0xf0, 0x2, 0xea, 0x1, 0x4, 0x10001, 0x2, 0x80, 0x10000, 0x4, 0xfffffffffffffffd, 0x200, 0x590, 0x9, 0xffffffffffffe648, 0x7, 0x7fff, 0x400, 0x101], [0x1d, 0x2, 0x80, 0xe9d2, 0x4, 0x3, 0xefb, 0x9, 0x9, 0x8001, 0x1, 0x2, 0xbf88, 0x0, 0x7fe0000000000, 0x7, 0x1c97, 0x8, 0x9, 0x3, 0x3f4, 0x8, 0x200, 0x100000, 0x3, 0x1ff, 0x4, 0x0, 0x7, 0x3, 0x8, 0x7f, 0x1, 0x3, 0xfffffffffffffff8, 0x6, 0x5, 0x13c0, 0xd5, 0x7, 0x1, 0x0, 0x7fffffff, 0x9428, 0x354, 0x100000000, 0x1, 0x6, 0x6, 0x8463, 0xba, 0x4, 0x5, 0x1, 0x30, 0x3, 0x2, 0x101, 0x1, 0x4, 0x1a, 0x1, 0xa35a, 0x9], [0x95f, 0xd03, 0x20, 0x7, 0x2, 0x5, 0x1ff, 0x4, 0x0, 0x7d, 0x9, 0x7, 0x10001, 0x1000, 0x6, 0x2, 0xffffffff, 0x7ff, 0x9c, 0x5, 0x0, 0x1000, 0x2d1, 0x401, 0x7, 0x0, 0x7, 0x7f, 0x400, 0xfff, 0x0, 0xf0f1, 0xd9, 0xfffffffffffffff8, 0x6, 0x2, 0x7fffffff, 0xfff, 0xffffffffffffff7f, 0x4, 0xd9f5, 0x82, 0x955a, 0x448, 0x9, 0xffffffff, 0xdd, 0x1, 0x5, 0x32e, 0x3f, 0x7f, 0x0, 0x7, 0xfffffffffffffff9, 0x100000000, 0x3, 0x1f, 0x8, 0x2, 0x0, 0x1, 0x4, 0x32ac]}, 0x45c) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') fremovexattr(r3, &(0x7f0000000000)=ANY=[@ANYBLOB]) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x0) 22:45:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000004c0)={0x1f, {{0xa, 0x4e21, 0x4, @ipv4={[], [], @rand_addr}, 0x100000000}}}, 0x84) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x165c, 0x80000001, 0x5, 0xffff, 0x81, 0xfffffffffffffd2b, 0x7, 0xf7a2}, &(0x7f00000003c0)={0x1, 0x800, 0x9, 0x50f, 0x5, 0x5, 0x2}, &(0x7f0000000400)={0x8, 0x9, 0x5, 0x8, 0xc, 0x9, 0x9, 0x4}, &(0x7f0000000480)={r2, r3/1000+10000}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f00000000c0)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="300000001000010800a96dcaf83ecf73adaf3fa41fdb000000002000000000000006bb7af81a212995591e211739bc9efb0ce11bd66ceeb9", @ANYRES32=0x0, @ANYBLOB="0000000000f4000008001b010000000008000400f0ffc500d9ac52903c68bb4284fae78bb09a16ecd779300200fdcf5b7ea7588100000000000000"], 0x30}}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$sock_ifreq(r0, 0x89df, &(0x7f0000000100)={'lo\x00', @ifru_addrs=@vsock={0x28, 0x0, 0xffffffff, @host}}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001640)=0x14) r6 = getpgid(0x0) capset(&(0x7f0000000580)={0x19980330, r6}, &(0x7f00000005c0)={0x8, 0xfffffffffffff000, 0xffffffffffffa72e, 0x3, 0x1, 0x1f8}) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000001680)={@local, @empty, @local, 0x401, 0xb8, 0x450, 0x100, 0x2, 0x1080001, r5}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x1ff) r7 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r7, 0x80404509, &(0x7f0000000200)=""/242) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 22:45:10 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000180)=0xe8) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) [ 677.327912] netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. 22:45:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x400000000000004}, 0x1c) dup(r0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000000c0)={0x15, 0x10000, 0x3, 0x7ff, 0x3, 0xffffffff, 0x100000000, 0xac28, 0x80, 0x1, 0x6, 0x7}) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x2be, 0x216) [ 677.387965] netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. 22:45:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000180)=@v2={0x2000000, [{0x1, 0x40}, {0x4, 0x9}]}, 0x14, 0x2) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)="7420bb8b00") setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x3, 0x81, 0x20000000000001, 0x10, 0x0}, 0x2c) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0x101) socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000180)="8f03efa610bfd51f1462e31f06701cf0b27cf9eb1191468abc3bae2f", &(0x7f0000000280)=""/146}, 0x18) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r0, &(0x7f0000000180), &(0x7f0000000000)=""/123}, 0x18) 22:45:10 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000200), 0x4) getsockopt$inet_buf(r3, 0x0, 0x0, &(0x7f0000000480)=""/37, &(0x7f0000000500)=0x25) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000640)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) r5 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r5) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r2) 22:45:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002140)='/dev/loop-control\x00', 0x8000000003, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) recvmmsg(r1, &(0x7f0000001e00)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000040)=""/11, 0xb}, {&(0x7f00000003c0)=""/229, 0xe5}, {&(0x7f0000000200)=""/29, 0x1d}, {&(0x7f00000008c0)=""/241, 0xf1}, {&(0x7f0000000280)=""/123, 0x7b}, {&(0x7f0000000340)}, {&(0x7f00000009c0)=""/236, 0xec}], 0x7, &(0x7f0000000ac0)=""/4096, 0x1000, 0xfff}, 0x8001}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000740)=""/169, 0xa9}, {&(0x7f0000000500)=""/40, 0x28}], 0x2, &(0x7f0000001ac0)=""/123, 0x7b, 0xaf}, 0x9e62}, {{&(0x7f0000001b40)=@l2, 0x80, &(0x7f0000001d00)=[{&(0x7f00000005c0)=""/17, 0x11}, {&(0x7f0000001bc0)=""/75, 0x4b}, {&(0x7f0000000640)=""/39, 0x27}, {&(0x7f00000006c0)=""/53, 0x35}, {&(0x7f0000001c40)=""/100, 0x64}, {&(0x7f0000001cc0)=""/25, 0x19}], 0x6, &(0x7f0000001d40)=""/133, 0x85, 0xa}, 0x43a}], 0x3, 0x2000, &(0x7f0000001e80)={0x0, 0x1c9c380}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001ec0)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001fc0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002000)={{{@in6=@mcast1, @in=@remote, 0x4e24, 0x2, 0x4e21, 0x1, 0xa, 0x20, 0x20, 0x32, r2, r3}, {0x40, 0xfffffffffffffff8, 0x28da, 0x8000, 0x0, 0x0, 0x401, 0x9}, {0xb4, 0x53a, 0xfff, 0x7fffffff}, 0xfffffffffffffffe, 0x6e6bb7, 0x2, 0x1, 0x8fd6a87e84ee1402}, {{@in=@remote, 0x4d4, 0xff}, 0x0, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xf}}, 0x3505, 0x3, 0x0, 0x33a8, 0xffff, 0x7fff, 0x7}}, 0xe8) 22:45:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x80800, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f00000001c0)=""/5) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000008c0)={0x200, {{0xa, 0x4e20, 0x10001, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10001}}, 0x1, 0x2, [{{0xa, 0x4e21, 0x3, @local, 0x7fff}}, {{0xa, 0x4e21, 0x3, @ipv4={[], [], @multicast2}, 0xfffffffffffffffa}}]}, 0x18c) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:10 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000140)={0x2, &(0x7f0000000180)=[{0x7fffffff, 0x1000}, {0x100000001, 0x5}]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000080)='irlan0\x00', 0xffff}) connect$netlink(r2, &(0x7f00000001c0)=@kern={0x10, 0x0, 0x0, 0x42810080}, 0xc) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40042406, &(0x7f0000000000)='/dev/loop-control\x00') inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) 22:45:10 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x40001, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e20, @local}}) write$uinput_user_dev(r2, &(0x7f00000008c0)={'syz0\x00', {0x2, 0x4000000000, 0x5, 0xb4}, 0x12, [0xfffffffffffffff8, 0x8001, 0xffffffffffff8000, 0x8a15, 0x0, 0x9, 0x7f, 0x8000, 0xff, 0x587, 0x2, 0x40, 0x7, 0x81, 0x6, 0x5, 0x101, 0x1f, 0x8, 0x1, 0x5, 0x3, 0x80000001, 0x7fffffff, 0xffff, 0x2, 0x10001, 0x3, 0x6, 0x0, 0x40, 0x3, 0x8, 0x3, 0x5, 0x1, 0x100000000, 0xd03, 0x3ec6, 0x3f, 0xfffffffffffffff8, 0x0, 0x6, 0x2, 0x5, 0x2, 0x101, 0x7, 0x6, 0x3, 0x8, 0x81, 0x5, 0x2, 0x8966, 0x5, 0x0, 0x0, 0x7, 0x3, 0x10000, 0x0, 0x7, 0x4], [0x40, 0x5, 0x7f, 0x6, 0x5, 0x40, 0x6, 0x80000000, 0xffffffffffffe43e, 0xd0, 0x800, 0x3ff, 0xe, 0x80000001, 0xffffffff, 0x401, 0x4, 0x8, 0x8, 0xffffffffffffff9e, 0x100, 0x5, 0x8, 0x0, 0x6, 0x3, 0x5, 0x6, 0x7, 0x9, 0x8, 0x2, 0x10001, 0x0, 0x3ff, 0x1, 0x8, 0x3, 0x8, 0x78, 0x3f, 0x400, 0xdeb, 0x3, 0x80000000, 0xf0, 0x2, 0xea, 0x1, 0x4, 0x10001, 0x2, 0x80, 0x10000, 0x4, 0xfffffffffffffffd, 0x200, 0x590, 0x9, 0xffffffffffffe648, 0x7, 0x7fff, 0x400, 0x101], [0x1d, 0x2, 0x80, 0xe9d2, 0x4, 0x3, 0xefb, 0x9, 0x9, 0x8001, 0x1, 0x2, 0xbf88, 0x0, 0x7fe0000000000, 0x7, 0x1c97, 0x8, 0x9, 0x3, 0x3f4, 0x8, 0x200, 0x100000, 0x3, 0x1ff, 0x4, 0x0, 0x7, 0x3, 0x8, 0x7f, 0x1, 0x3, 0xfffffffffffffff8, 0x6, 0x5, 0x13c0, 0xd5, 0x7, 0x1, 0x0, 0x7fffffff, 0x9428, 0x354, 0x100000000, 0x1, 0x6, 0x6, 0x8463, 0xba, 0x4, 0x5, 0x1, 0x30, 0x3, 0x2, 0x101, 0x1, 0x4, 0x1a, 0x1, 0xa35a, 0x9], [0x95f, 0xd03, 0x20, 0x7, 0x2, 0x5, 0x1ff, 0x4, 0x0, 0x7d, 0x9, 0x7, 0x10001, 0x1000, 0x6, 0x2, 0xffffffff, 0x7ff, 0x9c, 0x5, 0x0, 0x1000, 0x2d1, 0x401, 0x7, 0x0, 0x7, 0x7f, 0x400, 0xfff, 0x0, 0xf0f1, 0xd9, 0xfffffffffffffff8, 0x6, 0x2, 0x7fffffff, 0xfff, 0xffffffffffffff7f, 0x4, 0xd9f5, 0x82, 0x955a, 0x448, 0x9, 0xffffffff, 0xdd, 0x1, 0x5, 0x32e, 0x3f, 0x7f, 0x0, 0x7, 0xfffffffffffffff9, 0x100000000, 0x3, 0x1f, 0x8, 0x2, 0x0, 0x1, 0x4, 0x32ac]}, 0x45c) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') fremovexattr(r3, &(0x7f0000000000)=ANY=[@ANYBLOB]) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x0) 22:45:10 executing program 4: gettid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) fcntl$getown(r0, 0x9) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000200)=0xffffffffffff0001) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f00000001c0)={0x3, &(0x7f0000000180)=[{0xcb4a, 0x6}, {0xbe3, 0x2}, {0xfffffffffffffffc, 0x80}]}) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x35) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x12040, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000180)=0x1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:10 executing program 0: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000180)=0xe8) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x14) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:10 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) read$FUSE(r1, &(0x7f00000008c0), 0x1000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0xa4, r2, 0x313, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2c0}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x224c2a51ec293894}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x55}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x80}, 0x4000) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:10 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000200)={'nr0\x00', 0x80000000005100}) 22:45:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f00000008c0)={0x6, {{0xa, 0x4e22, 0x7fff, @local, 0x7}}, 0x1, 0x2, [{{0xa, 0x4e21, 0x1, @mcast1}}, {{0xa, 0x4e22, 0x23, @loopback, 0x7}}]}, 0x18c) inotify_init1(0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x311001, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000003c0)={{{@in, @in6=@dev}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000040)=0xe8) 22:45:10 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) setgid(r5) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) gettid() 22:45:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000340)=[0xee01, 0xee01]) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x200000, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}], [{@measure='measure'}]}}) 22:45:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x12040, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000180)=0x1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:10 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) inotify_init1(0x80000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) ioctl$EVIOCSFF(r1, 0x402c4580, &(0x7f0000000080)={0x54, 0x9, 0x7, {0xbf, 0x36b}, {0x81, 0xa}, @period={0x5b, 0x0, 0x9, 0x3cf2, 0x6, {0x0, 0x200, 0x9, 0x8001}, 0x5, &(0x7f0000000000)=[0x0, 0xff, 0x200, 0x80000001, 0x7ff]}}) 22:45:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:10 executing program 0: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000200), 0x4) getsockopt$inet_buf(r3, 0x0, 0x0, &(0x7f0000000480)=""/37, &(0x7f0000000500)=0x25) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000640)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) r5 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r5) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r2) 22:45:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000180)={0x0, 0x4}, 0x8) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:10 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) accept4$packet(r0, 0x0, &(0x7f0000000200), 0x80000) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) dup(r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300), &(0x7f0000000840), 0x3fe) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') execveat(r4, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000001c0)=':em0\x00'], &(0x7f0000000600)=[&(0x7f00000002c0)='task\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000540)='\x00', &(0x7f00000005c0)='-\x00'], 0x1d00) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:11 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f00000001c0)=0xe8) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f00000008c0)={0x90, 0x0, 0x6, {0x4, 0x1, 0x0, 0x0, 0xa000000, 0x3, {0x1, 0x3ff, 0x80000001, 0x1, 0x101, 0x1, 0x6, 0x80000001, 0x4, 0x7, 0xff, r1, r2, 0x5d4a, 0x1f}}}, 0x90) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r3, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) getsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f0000000500), &(0x7f0000000640)=0x4) execveat(r3, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r6 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000980)=""/160) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r7 = inotify_init1(0x0) fcntl$getownex(r7, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r6, 0x4b4e, 0x32) r8 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r8, &(0x7f0000000100)={'system_u:object_r:file_context_t:s0', 0x20, 'system_u:object_r:auditd_exec_t:s0', 0x20, 0x0, 0x20, 'Xystem_u:system_r:kernel_t:s0\x00'}, 0x7a) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0xb}, 0x100}, 0x1c) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:11 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @local}, @in6=@ipv4={[], [], @rand_addr=0xff}, 0x4e22, 0x0, 0x4e20, 0x6, 0xa, 0x0, 0x20, 0x0, 0x0, r2}, {0x2, 0x1, 0x2, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x13f4, 0x4}, {0xcc, 0x4, 0x3, 0x5f76}, 0x9, 0x6e6bb5, 0x3, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d5}, 0xa, @in6=@remote, 0x3503, 0x4, 0x3, 0x101, 0x7fffffff, 0x2, 0x4}}, 0xe8) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1000, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="2c626c6b73697a653d3078303030303030303030303030303430302c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f74686572582c626c6b73697a653d3078303030303030303030303030303430302c216c6c6f775f6f746865722c616c6c6f775f6f746865722c6673636f6e746578743d73746166665f752c7375626a5f757365723d002c6d65617375726b7ab5652c65", @ANYRESDEC=r6, @ANYBLOB=',fscontext=system_u,fowner>', @ANYRESDEC=r7, @ANYBLOB=',rootcontext=user_u,audit,smackfsdef=@selinux,\x00']) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000900), &(0x7f0000000940)='fuse\x00', 0xfffffffffffffff9) r8 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r8, 0x4b4e, 0x0) 22:45:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="93", 0xfffffffffffffffa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000002c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000280)={0x0, @aes256, 0x2, "f5d68edf79f4883e"}) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000200)={0x90b, 0x7ff, 0x1761, 0x440}, 0x10) 22:45:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:11 executing program 1: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f00000001c0)={0x401, 0x4, 0x7f, 0x101}) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x800000, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)="7461c69c85b6736b00") setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) write$UHID_CREATE(r1, &(0x7f00000003c0)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000008c0)=""/4096, 0x1000, 0x7, 0x7f, 0x8, 0x2, 0x34}, 0x11c) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) accept4$unix(r1, &(0x7f0000000180), &(0x7f0000000040)=0x6e, 0x80000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:11 executing program 0: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) setgid(r5) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) gettid() 22:45:11 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:11 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x100) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) prctl$void(0x7) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) write$binfmt_misc(r0, &(0x7f0000000140)={'syz0', "9b950890ec90bba001195d830388e74c7aa5cfe9e9a51a37ac6008a9474a367e1f9db1874dbd8b3247d2119204a03c992036c006fd2dd4314f349037ee103c53f10d64d0134875c30eb3658a89508301d945b7eef5ab099e0efd177a6140fdd2ab553eda6740b61885d8b455eec275dcfab67e38fa33ece33b56dbdd51cc7284b43a3bc10471f195290b6e76a350cb871c8afc64296d38b4ba5738498efeb193c347c943bcc2c8dcccc4203671517bf3706c1b408b46b1e3c689d82a06db714c093244a6d53f355479c9a84c28ffc0f30f10b31900f42f77c877b4"}, 0xdf) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x3a) 22:45:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff8) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000280)={'bridge0\x00', {0x2, 0x4e23}}) getsockname$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000200)={r3, @dev={0xac, 0x14, 0x14, 0x13}, @multicast2}, 0xc) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_config_ext={0xf7, 0x635e}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000200)={0x3f, 0xf11, 0x1c9a0a57}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000180)={0x5, 0x0, 0xe, 0x2, 0x1000, 0x9, 0x9, 0x0, 0x80, 0x7, 0x1c, 0x1}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x403c5404, &(0x7f0000000040)={{0x3, 0x3, 0x2, 0x3, 0x3f}, 0xffffffffffffffc1, 0x6}) 22:45:11 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000840)="60b1ac27968454154f2228c270880419e0b27745761a4ff5f92d2ed3f17d8e940f9229a4c4a1425ec4cea7556edc405d85eaddf34b8123db535ef83926c5065f2d2a374449badd06665cb3f6b4f1e120d3adb58d4e339d3548a8e0178ba40f88a842d18300bfc7ef8a8fccf8cdc53f9cc0e0d79e3e5af5f85c4eec86d18072bfd4cca3d6038c9037c5743abae94b0b6d28eaacd35de2da39687a656c2b176c67056032dc689187d04770a225cc9a184b15581904e438673df28cac483c08b9b47d292ba007c123d646411d2d09cab04438101f28fb445574b8d857", 0xdb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:11 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x121100, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) pwrite64(r0, &(0x7f0000000140)="82c0d011248a62494a5fa1a5589b86fcc9821712de86fd1a62fe1d322f9a316b6bd277836b3e3bcc2a02bc3e82eff39645cd31bd743a11efb5e0af24072d6c9cdf6a1a9e7e46a95d05c489a6cfd6fc049ae77ce670d972ba7e873fc5b24e1f38b91706710729e95f6c3cee7ad108ddc6b2d4f8626d863fc48cff6bfde9dee9fec17fffbc72e33895eaf6c9b7a89257fc4fb57a516b282854ef20593322f7162b371e9feb067e9439085dc70dd7ffc76bca9483881f08a2aeb13a5962d93ac0bc5cebf074afbe3a5a6ad84c1ae37a53583db15a46e8", 0xd5, 0x0) r1 = request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') keyctl$restrict_keyring(0x1d, r1, &(0x7f00000005c0)='encrypted\x00', &(0x7f0000000600)="93") setuid(0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x800, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) sendmsg(r2, &(0x7f0000000580)={&(0x7f00000003c0)=@can={0x1d, r3}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000440)="415446141e4517264e54f35e07291f0d5a7e419910cf197fa1706bc40847ca1fe2f301ebf9eb7847ef6aa4de7c3704ade132b2658f772442cb44caf7f92131cbbeb7420a2860aa656a6ac3ab203d6efea0e534b65f94a3949f48e1c1f8914f884ad083be4b28f084e0a1d255b6906e76b1f67723167e662f56610f4ca7d0cb8026e114c7013512710290b3f11356a3481b61f60dd342de6f", 0x98}, {&(0x7f0000000500)="f803462e32003bbbfbcb4937be944685ce9ed28ba2cbb00bdaac532bb0663d9d8c0423c881e57e275d805558ca662113424d67c34559178f77c44e2ca4728047ec0466917ad4f9ce2dbd", 0x4a}], 0x2, &(0x7f00000008c0)=[{0xf4, 0x109, 0x101, "077ef82d24aa6b961f27ec7d2ed94183291e16705ebced64229c52f0a1a301853c0078c3c4691aae935754433ccc3dc97df8fe79bd23f22e4b18dec98af0f4178b4d4336d8e995c34064780087c5f3103862aad9225ffd746529648d034242238146f58bac22a8ecb39fb6833b2f5e596ec84e498443c34f0e2e9471baa3e94fc968a92eb40e8671a951bb2a55f297665096d1fced6e1c135e6be08ae28797e93eb160a24e607d62bcceda0877417ecf7d4c98cfdedab49529e10107ae32bdae9e3461332d874bee18259a22401c1c1c340201424c099a6095a32f5be621d185a6f1b95eb69273"}, {0xb8, 0x1ff, 0x1ff, "c1c37c6b48a88d6817e88d6c530d96b7fc8034189bf3f269eba1a8f95ba3f5c67261aada43526d66a8f14bc01b75420db7a52cbfcebca024ff1404d701a54b7b85003c4a06eb367efe36aea90fcef91913de1e90c579bba22fe749da2769dff7df12fe17f9fe25c356395d9323d281f2bdfdce58885642c75d1bd9001606f4dcbec4ddb970f76a3ee2ceebf5ae885855f8b454ada4d448b5e0f01d1fb264ede056680c87a5fdf6c8ba13c832"}], 0x1ac, 0x40000}, 0x44000) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) 22:45:11 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @local}, @in6=@ipv4={[], [], @rand_addr=0xff}, 0x4e22, 0x0, 0x4e20, 0x6, 0xa, 0x0, 0x20, 0x0, 0x0, r2}, {0x2, 0x1, 0x2, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x13f4, 0x4}, {0xcc, 0x4, 0x3, 0x5f76}, 0x9, 0x6e6bb5, 0x3, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d5}, 0xa, @in6=@remote, 0x3503, 0x4, 0x3, 0x101, 0x7fffffff, 0x2, 0x4}}, 0xe8) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1000, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="2c626c6b73697a653d3078303030303030303030303030303430302c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f74686572582c626c6b73697a653d3078303030303030303030303030303430302c216c6c6f775f6f746865722c616c6c6f775f6f746865722c6673636f6e746578743d73746166665f752c7375626a5f757365723d002c6d65617375726b7ab5652c65", @ANYRESDEC=r6, @ANYBLOB=',fscontext=system_u,fowner>', @ANYRESDEC=r7, @ANYBLOB=',rootcontext=user_u,audit,smackfsdef=@selinux,\x00']) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000900), &(0x7f0000000940)='fuse\x00', 0xfffffffffffffff9) r8 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r8, 0x4b4e, 0x0) 22:45:11 executing program 3: r0 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x8, &(0x7f00000003c0)={0x9}) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x10) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r3 = getpgrp(0x0) sched_getparam(r3, &(0x7f0000000180)) setxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="6f73782e6465762f6c6f6f702d63ff7f74726f6c00"], &(0x7f00000002c0)='\x00', 0x1, 0x3) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000480)="73ff0100001e047273ed1fa65b2e9c18b02cb5", &(0x7f0000000400), &(0x7f0000000840)="93", 0xfffffffffffffff9) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40046607, &(0x7f0000000340)=0x7fff) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$TIOCSBRK(r4, 0x5427) 22:45:11 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$EVIOCSFF(r1, 0x402c4580, &(0x7f00000001c0)={0x54, 0x4, 0x10001, {0x2, 0x9}, {0xfff, 0x9}, @period={0x5c, 0xf5, 0xff, 0x9, 0x0, {0x10000, 0x81, 0xffffffffffff7fff, 0xffff}, 0x3, &(0x7f0000000180)=[0xa0ee, 0x3, 0xe72c]}}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 22:45:11 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @local}, @in6=@ipv4={[], [], @rand_addr=0xff}, 0x4e22, 0x0, 0x4e20, 0x6, 0xa, 0x0, 0x20, 0x0, 0x0, r2}, {0x2, 0x1, 0x2, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x13f4, 0x4}, {0xcc, 0x4, 0x3, 0x5f76}, 0x9, 0x6e6bb5, 0x3, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d5}, 0xa, @in6=@remote, 0x3503, 0x4, 0x3, 0x101, 0x7fffffff, 0x2, 0x4}}, 0xe8) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1000, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="2c626c6b73697a653d3078303030303030303030303030303430302c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f74686572582c626c6b73697a653d3078303030303030303030303030303430302c216c6c6f775f6f746865722c616c6c6f775f6f746865722c6673636f6e746578743d73746166665f752c7375626a5f757365723d002c6d65617375726b7ab5652c65", @ANYRESDEC=r6, @ANYBLOB=',fscontext=system_u,fowner>', @ANYRESDEC=r7, @ANYBLOB=',rootcontext=user_u,audit,smackfsdef=@selinux,\x00']) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000900), &(0x7f0000000940)='fuse\x00', 0xfffffffffffffff9) r8 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r8, 0x4b4e, 0x0) 22:45:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) write$P9_RWRITE(r2, &(0x7f0000000180)={0xb, 0x77, 0x2, 0x5}, 0xb) 22:45:11 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) socketpair(0x1f, 0x807, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x5) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) 22:45:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000180)={0x3, 0x7}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:11 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f00000001c0)='posix_acl_accessbdeveth0bdevuseruser~\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:11 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:12 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @local}, @in6=@ipv4={[], [], @rand_addr=0xff}, 0x4e22, 0x0, 0x4e20, 0x6, 0xa, 0x0, 0x20, 0x0, 0x0, r2}, {0x2, 0x1, 0x2, 0xffffffffffff0001, 0x5, 0x7fffffff, 0x13f4, 0x4}, {0xcc, 0x4, 0x3, 0x5f76}, 0x9, 0x6e6bb5, 0x3, 0x1, 0x2, 0x3}, {{@in=@remote, 0x4d5}, 0xa, @in6=@remote, 0x3503, 0x4, 0x3, 0x101, 0x7fffffff, 0x2, 0x4}}, 0xe8) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1000, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="2c626c6b73697a653d3078303030303030303030303030303430302c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f74686572582c626c6b73697a653d3078303030303030303030303030303430302c216c6c6f775f6f746865722c616c6c6f775f6f746865722c6673636f6e746578743d73746166665f752c7375626a5f757365723d002c6d65617375726b7ab5652c65", @ANYRESDEC=r6, @ANYBLOB=',fscontext=system_u,fowner>', @ANYRESDEC=r7, @ANYBLOB=',rootcontext=user_u,audit,smackfsdef=@selinux,\x00']) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000900), &(0x7f0000000940)='fuse\x00', 0xfffffffffffffff9) r8 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r8, 0x4b4e, 0x0) 22:45:12 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:12 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r2 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @multicast1, @rand_addr}, &(0x7f00000001c0)=0xc) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000200)={r3, 0x1, 0x6, @random="210545e01cc9"}, 0x10) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000040), &(0x7f0000000840)="93", 0xfffffffffffffff9) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(r0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), &(0x7f00000001c0), 0x2000800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="93", 0xfffffffffffffffa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000002c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000280)={0x0, @aes256, 0x2, "f5d68edf79f4883e"}) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000200)={0x90b, 0x7ff, 0x1761, 0x440}, 0x10) 22:45:12 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:12 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r2, 0xb20, 0x70bd2d, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:12 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='vask\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x7326bded) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000180)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff31) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r1 = inotify_init1(0x800) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$void(r1, 0xc0045878) 22:45:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x80200, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) pipe(&(0x7f0000000500)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) openat$keychord(0xffffffffffffff9c, &(0x7f0000000280)='/dev/keychord\x00', 0x2002, 0x0) 22:45:12 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x4, &(0x7f0000000080)=[{0x7fb, 0x20}, {0x80000, 0x7}, {0x8}, {0x10000, 0x1}]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000280)='id_resolver\x00', &(0x7f0000000680), &(0x7f00000002c0)='[\x00', r1) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') gettid() ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000000)={0x101, 0x7fff, 0x4, 0x0, 0xfd0d}) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x6) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f00000000c0)={0x0, 0xf, 0x2, 0x9, "2c8bd773751618afa8918c217505ca67e6677cdb29c5e17ae760f4efb8a25cde"}) 22:45:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="93", 0xfffffffffffffffa) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000002c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000280)={0x0, @aes256, 0x2, "f5d68edf79f4883e"}) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000200)={0x90b, 0x7ff, 0x1761, 0x440}, 0x10) 22:45:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x120) bind$netlink(r0, &(0x7f0000000180)={0x10, 0x0, 0x25dfdbfe}, 0xc) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f00000001c0)={@multicast2, @local, @dev={0xac, 0x14, 0x14, 0xb}}, 0xc) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) keyctl$negate(0xd, r2, 0x6, r2) 22:45:12 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000001c0)) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:12 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) getsockopt$inet_int(r2, 0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r0, 0x7, 0x3}, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:12 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) sysinfo(&(0x7f0000000180)=""/1) r1 = request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000140)) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) request_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="6367726f757025276e6f6465767070703073656c6680396367726f757029cf00", r1) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f00000001c0)=0x100000000) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) 22:45:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000040), 0x4) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000003c0)) 22:45:12 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000400)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:12 executing program 0: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000001c0)) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/create\x00', 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:12 executing program 4: r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r0, r1, 0x0, 0x16, &(0x7f0000000200)='keyringwlan1systemem1\x00'}, 0x30) r4 = syz_open_procfs(r3, &(0x7f00000001c0)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r5 = inotify_init1(0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:12 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) r2 = dup3(r0, r0, 0x0) linkat(r1, &(0x7f0000000180)='./file0/file0\x00', r2, &(0x7f00000001c0)='./file0\x00', 0x1400) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:12 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 22:45:13 executing program 0: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='vask\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x7326bded) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:13 executing program 1: gettid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r5) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f0000000400)=0x6, 0x4) r6 = memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fchdir(r2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) fcntl$setpipe(r0, 0x407, 0x19a) ioctl$KDGETMODE(r6, 0x4b3b, &(0x7f0000000300)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x402c0, 0x0) 22:45:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x8, &(0x7f0000000180)=[{0x7, 0xffffffff, 0xfffffffffffffffa, 0x200}, {0x2, 0x15, 0x8, 0x376}, {0x8, 0x38f, 0x2c, 0x100000001}, {0x3ff, 0x5, 0x5, 0x100000000}, {0x371c, 0x8, 0x80000000, 0x7fffffff}, {0x7, 0x8, 0x400, 0x5}, {0x55cf035f, 0x2db, 0x9, 0xff}, {0x80, 0x8, 0x1, 0xfffffffffffffff8}]}, 0x8) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:13 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000002c0)={0x400000ce, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x4, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="090091cb2a36c78ae634ec6474ee0000a811aa1f27a0066fbbff62c396e4d94ab51ccd73c3d6fd7e935006f075f1a9919c045ffd809e3da4"], 0x77, 0x0, &(0x7f00000001c0)="928f3d96df78c2b2ffab2041c4aa815087da3ce9795df5e8b52053cd98f06bd6e6137a7d9072161fed13cd86511cf0d704727fae9be6bb5e76f34a448cddcc222b812bbc4e6c3595e094acee01a9f32b8675bb8f9ef8a9f50d3f7e4dc6d45c20421e1f5e2fb073e0b2c11ee60331c909515238c27da371"}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='rxrpc\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:13 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') chmod(&(0x7f0000000000)='./file0\x00', 0x2) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:13 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x2, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000480)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000400)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) pipe2$9p(&(0x7f0000000280), 0x80000) setregid(0x0, 0x0) setuid(0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) readv(r3, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/33, 0x21}, {&(0x7f0000000840)=""/205, 0xcd}, {&(0x7f0000000780)=""/75, 0x4b}], 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r4 = inotify_init1(0x2000000001) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$int_out(r1, 0x5460, &(0x7f0000000180)) 22:45:13 executing program 0: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='vask\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x7326bded) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:13 executing program 2: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000400)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:13 executing program 1: gettid() socketpair$inet6(0xa, 0x1, 0x8, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf0, 0x108, 0xfffffffffffffffc, {"bf6c4fce1efeea2819fac162b6ad758d8047f53351006558e270097c3b6063871bba39b1dd5f210b7bbd8c9428315027b2265b115aef24300a54eccda365e5b94ebdeb82f4c19f870f3faa07c49c986a57d06dbad3d64dca30b752eb2d15d28a6adaf2c7ec1acca40ec0c43abcbc8395fd628cc5311125f1e2fff599023fb1141e90b88fee75a1b712d970a35195b21aefa02d7f8cb28ceb1cc5e97eb4b4f0b5fdb985c518ae4ee370fd8214149595309587c12f3ea77543c436616387d6c163f804dc4eee9a0144391f85c409d256800e02032f295c383d641b3719e7276e9f141fef17d75f0e36f279f9330a2f5390"}}, {0x0, "6a5a8102cd85d9569176309ec4539d7c7ef715d009cfe7f09f4b51e3e1d26062921b693749ff8033fea69b1dea67192c90313c0bb5e3810d10103e5e36a9c839e7427c8ea4591b9be687d87da609ff09c4dbe4034a21fb1866279bc16390d24f38ed78e27cd5bce72429df461bfde9ce1524460c81cf6c"}}, &(0x7f0000000300)=""/17, 0x181, 0x11}, 0x20) splice(r0, &(0x7f0000000280), r1, &(0x7f0000000440)=0x1e, 0xfff, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = creat(&(0x7f00000003c0)='./file0\x00', 0xa) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') pipe(&(0x7f0000000040)) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x81000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00032dbd7000ffdbdf250d0000002c000200080003000200000408000600dfc4ffff08000300010000020800050007000000080002004e2200000800060001f0ffff9a3788427b63471615af10168774bdd5708e7e568d0e910cdb8d91ba0d610e959e26974928342531f1382bdaf0580e77d9d13f8d634d1d96b23e38443c34bb86fffffffff5d2dd6979749571462625d93529c251f6333e53a14183346042d6f4b85012db24912c77230e8c6bbd7183a74afc661c"], 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x4000) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) keyctl$get_security(0x11, r3, &(0x7f00000008c0)=""/4096, 0x1000) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:13 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:13 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000180)="2f6465762f7667615f61726269746572003649320436972b1072b938190a19624969b923aebbc4eb204f07c9eb16d156e9c0f3f0f185fe9295faa9c21a75e82dde2a56be847b457fadc353add6e9dbc02f5004fa3ec972290df8161aa50b16ee2010ba1db6b96b9e4117dff6e0723d811099d58a523aa945978d5ffc3150deae46ef5b5d9b5de02fdc485de49d1a714f", &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f0000000280)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0x50, &(0x7f00000003c0)}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:13 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') chmod(&(0x7f0000000000)='./file0\x00', 0x2) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:13 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') chmod(&(0x7f0000000000)='./file0\x00', 0x2) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x20000, 0x40) linkat(r1, &(0x7f0000000180)='./file0\x00', r2, &(0x7f0000000200)='./file0\x00', 0x400) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') write$cgroup_int(r3, &(0x7f0000000280)=0x4, 0x12) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) socketpair$inet(0x2, 0x80e, 0x0, &(0x7f00000002c0)) 22:45:13 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x200200) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000240)=0x1) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)="fa5614187444ac32e41e925ecbae6ca00d0e3f0f751f59af8746658a37ba33a1a505e90449ac8d60b76420904b1bf9d66ad04b67da08fb73590faa", 0x3b}, {&(0x7f0000000280)="b99e68a7f8b9a819e1d3818e77b367ee88db7e3d248d195c033e207ac95d0231a21f7e6dc6da99c895c525f8df0a86c7344e6d893e2f76053f", 0x39}, {&(0x7f00000002c0)="c3a94fa2ca3eb0973faf84d0657be7c920379efd34a9a33f4c724484585acb175fd55ae0028376aeb9ddbb5ac886c55ac958337f37ba376fd55037d935814cc00defc1fc1d02e64261654e615cc039c1f46cc20f296c309410725ed89a3bff85baaa58da27880af3e158862cd94ff3c870b467ba5b37ac25ffa51060d6f2100e", 0x80}, {&(0x7f00000003c0)="60f1edbf3d4e552ed800be4ce85bcd5514015cf39db2f2ba0faf21bc503c7105686e096197d1266ca18e167f721481f46e9e8819f2f2416a56afba80a093b398d6e02556dee20ca12d2e7582797d36542590892d612d92b3cefd2b2fc6267d6cd4dd2742c73fd1aa2d11187b34e48bddd5831553126fe29c84710da51a20dec8287d0e4edd1ed65607ffaede86f6a5a862e8ed42", 0x94}], 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') write$binfmt_script(r1, &(0x7f0000000480)={'#! ', './file0', [{0x20, 'syzkaller\x00'}, {0x20, "93"}], 0xa, "db63e96feb8fa496976e55b80c9fa29266360331ece00f4e32c0489e1e2ec7c8b937c3c8b3d5a4cc8df0f169914c"}, 0x46) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000140)) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000100)=0xffffffffffffff01) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000180)=0x0) ptrace$poke(0x5, r3, &(0x7f00000001c0), 0x2) 22:45:13 executing program 1: gettid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x6130, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000200)={r3}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80047601, &(0x7f00000001c0)) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000280)=0x9, 0x4) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:13 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') chmod(&(0x7f0000000000)='./file0\x00', 0x2) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:13 executing program 0: gettid() socketpair$inet6(0xa, 0x1, 0x8, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf0, 0x108, 0xfffffffffffffffc, {"bf6c4fce1efeea2819fac162b6ad758d8047f53351006558e270097c3b6063871bba39b1dd5f210b7bbd8c9428315027b2265b115aef24300a54eccda365e5b94ebdeb82f4c19f870f3faa07c49c986a57d06dbad3d64dca30b752eb2d15d28a6adaf2c7ec1acca40ec0c43abcbc8395fd628cc5311125f1e2fff599023fb1141e90b88fee75a1b712d970a35195b21aefa02d7f8cb28ceb1cc5e97eb4b4f0b5fdb985c518ae4ee370fd8214149595309587c12f3ea77543c436616387d6c163f804dc4eee9a0144391f85c409d256800e02032f295c383d641b3719e7276e9f141fef17d75f0e36f279f9330a2f5390"}}, {0x0, "6a5a8102cd85d9569176309ec4539d7c7ef715d009cfe7f09f4b51e3e1d26062921b693749ff8033fea69b1dea67192c90313c0bb5e3810d10103e5e36a9c839e7427c8ea4591b9be687d87da609ff09c4dbe4034a21fb1866279bc16390d24f38ed78e27cd5bce72429df461bfde9ce1524460c81cf6c"}}, &(0x7f0000000300)=""/17, 0x181, 0x11}, 0x20) splice(r0, &(0x7f0000000280), r1, &(0x7f0000000440)=0x1e, 0xfff, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:13 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)={0x0, 0x0}) r3 = getpgid(0x0) rt_tgsigqueueinfo(r2, r3, 0x34, &(0x7f0000000340)={0x17, 0x933, 0x0, 0x400}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000180)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socketpair(0x0, 0x804, 0x2, &(0x7f00000001c0)) request_key(&(0x7f0000000200)='big_key\x00', &(0x7f0000000680), &(0x7f0000000280)="93", 0xfffffffffffffff9) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/policy\x00', 0x0, 0x0) 22:45:13 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:13 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0xa001, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e05411, &(0x7f00000008c0)=""/4096) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) socketpair$inet(0x2, 0x0, 0xffffffffffffff3c, &(0x7f0000000080)) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) 22:45:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = creat(&(0x7f00000003c0)='./file0\x00', 0xa) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') pipe(&(0x7f0000000040)) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x81000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00032dbd7000ffdbdf250d0000002c000200080003000200000408000600dfc4ffff08000300010000020800050007000000080002004e2200000800060001f0ffff9a3788427b63471615af10168774bdd5708e7e568d0e910cdb8d91ba0d610e959e26974928342531f1382bdaf0580e77d9d13f8d634d1d96b23e38443c34bb86fffffffff5d2dd6979749571462625d93529c251f6333e53a14183346042d6f4b85012db24912c77230e8c6bbd7183a74afc661c"], 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x4000) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) keyctl$get_security(0x11, r3, &(0x7f00000008c0)=""/4096, 0x1000) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000180)={0x27f, &(0x7f00000001c0)=[{0xfffffffffffffffe, 0x3}, {0x3, 0x7}, {0xfffffffdfffffb2f, 0x3ff}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80047601, &(0x7f00000002c0)) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_names\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') r2 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockname$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000400)={@remote, 0x0}, &(0x7f0000000440)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40005400}, 0xc, &(0x7f0000000480)={&(0x7f00000008c0)={0xdc, r2, 0x100, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0xc0, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7f}}, {0x8}}}]}}]}, 0xdc}}, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:13 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) init_module(&(0x7f00000001c0)='proc![vmnet0\x00', 0xd, &(0x7f0000000200)='GPL:\x00') ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:14 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000140)=""/4096, &(0x7f0000000040)=0x1000) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 22:45:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000180)={0x27f, &(0x7f00000001c0)=[{0xfffffffffffffffe, 0x3}, {0x3, 0x7}, {0xfffffffdfffffb2f, 0x3ff}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80047601, &(0x7f00000002c0)) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_names\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') r2 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockname$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000400)={@remote, 0x0}, &(0x7f0000000440)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40005400}, 0xc, &(0x7f0000000480)={&(0x7f00000008c0)={0xdc, r2, 0x100, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0xc0, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7f}}, {0x8}}}]}}]}, 0xdc}}, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:14 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80080, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x1c3, &(0x7f00000000c0)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)="1f18a944275390845051eed5e73244c1608be0427aa2d65f00e24ac225f12bd974ea3682d6b4f004dd985fe1be1c461076281a3d16b88f29e42872c5ab6cfac2fee7df9a45f9de527b59bd885b32df620150953b7340152a0bd9f24fccaa0de09d5bbd13", 0x64}, {&(0x7f00000001c0)="43a242a9a5c1eca18eae22035e49ee80a164c88a454189f8212f7dd871efbea35e3255487ce1126a7d145464cda07639f6c8b8e7faf118f358b9e037d3a0517401e7839cbeddbc970d69ed90608566a489bfcc8b76074a98202dd29c2e8b1b612924a61e", 0x64}, {&(0x7f0000000240)="3a4c1bdcecd1e1d8de263d263fdc9c2f3c7c859e6d1230e7b4c96185", 0x1c}, {&(0x7f00000008c0)="3c79ea0aaff7044e9ae3928103648fe8e91198dce743e41ee72718db03b6bac21fc30952de56f799562b90439d3949a23d47461e5428923534b28681bd3386342a5a9ae3d68108a942567f1b5d0a7362b38ae598901a0c7f810e3fe464c806784442dae855c6c2a6e7260dc7fdd23bbfaf576feb2eb2c3cd260e12553aa018cc387fea08df23fce545a5755c1e768e309ec124a302357340e672f1af0ae3ab240ab176307d5af64846c6a30c10db3f228975536b560efbc9e8ae9059a0d0291948dad0d9a8ed96dbe0b6962fc3e7862ec94b3ca3015ce5189105461b25038ea8f32ba86e6092e5ccaa4a29f2dddee2bdf0f2df18a9ccdd3a7224af4418e0bad2c03f7a750bcc7b03d9746c4ec08df6ccb422f0ccb256a24e0fd3eac22fb17ba8d15cacc53522286b128a8277c35112f8f138b8b3c25ae07563d3180f2bcda776f655b51f2012b16e635a3895dbbd1624f7acff9e06cd95be6274661b39918bca9e58c5037d08f1d3c06a01e7122d536991a962f39199ed15376b775eb6d3ba6e0471b8facb702c65a3860ff59ffdc50af711f4d43e62f9b1d54a830dbb0035aa77ae384cbe3f4c2bd010561a22d08e171eccb05d0f17a0f0279842fcca99377101eb76a40091823cde13b9694cef9cd42629772c96bc880e3f2458d8d968a872cf57f95fa75fa5d499336a0ea66b4418a1155a2546d282a470087c7e3a5abff4286e06337c776d547369ed682b12d2d3c619f85aaddf6dcd77da5cefea7f6bb363c28cde5d12db08f29893b74ea6b8c640f18a7e6264ae44cc3cae2996b88f2f333d53949f933bb8538a113f4f086ad6b372db548c334299222dbbbe2af068539de2b7ae950a1b30a2f4f5697fc87974dc3634ac476127d9fbd946049eccf0732c9bfb414a89324340c8af1498ff75f7b54a8f0c235ea560172907cc282631ef6492f4ca56460b3c075565e0182f62e9355c46c967cabfcd3a0ff4bbe22849d25af9b40523d2be8716346040cf0659e7c871d7a556c45ea94af169f40a64bbd5531031574f93a1ceb3b481774e67994634f4fafc941ba08c468be274f152904eca1745d8803d1ac86a13158d5a7a7d496a7cda5d427840560204c38d38552c1aae97f2a14743ba4e830d0a20d770ad34fe9f668d3a432b6d0d39b4b8badd4eacf1e95feb114731588ff62e8c08787680211256fd617dcdaedd03ce29200adb2a162de7e72107361c0e8f7b7c4b21bc1c768eaf6a0537582a038cb7241afb714ad089fc6ace70cd39647d500a55b0c4e1abe54ebd9c2afe961759d7dbe23f766b4d6a69b01ed5cd09ba50bfe38a3f4b299c6430fa97ec056db06d709f71a3fa0141fb60c4d2599e7f383cf706e83691da7bbdec459e11e7f6f38e93161389745d59816ca3168229022f59e709f1cf6eb3e747e56fb94945771837c23c77841211f56d41b83be047709c9da504448069ae1a7a7455f0212d4161ac10e02692eb7e35e020dbefc4b41f69bc6e0f7cd52a524425c3895dd051f973dce6e38980e37d8bf8fe0eede017c4a078475a24fff5efc14b0ea6bd93eba1610b7469e7c76d9fef2846d374ced14117ca6bfa3cf2dda1430f8895c68fd4aef66b7f66fbb7d520df026d0c7ce03f4bc3964405cbd3c1b23c5a085ece7db49a7513a7e6c3e5dff71fff7aed50d8e35220299927e44d162ade28bff6e4616ef037760eead4f292e90b5412c505b31ca762a6d7f068eb18d63876a7a725f9339a597f4095d2d9a9be7576fe37cfd15428bfa3a22c16888029a7e98d8f02bce3412c37260f2f23bfd345db123bb6c4854dcc7e17da6cda6d486d3b36a983fbad82809058872d8d52c4a7cf809727afa84476c1eddfe67f7ab4ef0d86769f4e6eff11d3b0787337aa7d63757d131cff9e05aef453344b23c7187186f493298d6c5d5083ec39acb44ebf0607238fe4d75c55b47699cfe36411d71bc985884bb525d445da57a450680d8b3935b0d0d880dd57bc008b56d7a8ebd3c04590a74fa84d4d84774fffe3197fb29b9c4519a5ffd64390a3a0af5e3a65010a75fddc6b1e86c056ef53b931bf772c57c610e0fd1b7d7d7fb3f25a0b900f0877babe17fc5ede1f3419cbf2ebd936e95f34e07617f2329818a98a954697ba55a3c3349b62cd676c82967e856b8cf4ce94119aac64cfc69d92eb1bb04f7a4c5c3775d6aa27bb3236bb3c1d897e66dbae43ceff0902227ae6be779641bdbe67ce8294141ea80fa59cd309d800685adcd3355bb09cf8c9509e59f8dca248e2eb92c548e4365c6276b73c7131cbb85e34bc86b23e307370fe08faf58830b91663693a7b5d14b01219bd02c457bf62cfe246b73ba5744d00d58e90b4e9d37a7abb51b1fcbe0ea02a7a5133a2e414d7bb2576ccbe537e88666deec5cbd273fed80941fea94203ac90a1374f050d8777ccd95429504872ab3c609e8bc2ea8fac0e61bb3be05bd66fd2c973e8fe19ed11e0b1ee0be4c73bf83ca9a1b6781f96c5ac8b72436892aef3cc8ca8abbf904d7a268fda541db18473451f88951bbd62d281b6d3f753087e0dd3c0fd14a0d5efa3e26358b14a3adc5d436394dd922d8575963c1324eb75250236bcd466fe0d691a677cdd4580cce3f0fd38643f7635ee89e98484bdc3ebb358db0b7cd57f070cc608b6306ed7839bfbe2af4235544b9da526a7a2f8bd5bc22b21f27e99537db5bd0cdb0b38ba1285c358578f7fefa43d3fdd83d2533eb144c2bbffe661412c5d0b25f81ec62f10db0d3f2f294587d730379ed397fcc1517d0bf5c4bd71b2057f284d981049213827da08e655aee8d4f0eb88a3f41eafd99428d010a578e2663af8b99a9af1ebb033574d2a85747455f196fcb471349c8c16e4458a2d19067702b0455f260f898138aeca0f1c4c4b6eef87e028995051fa1ca3fa067578e9d5ee224aae0e99073405998b5040b006fae180b2eadb127061373a3c6398aea884185eac7f9c4704618d1735ced47df0945400d5bc20a0791c2eb1586abafbbdfba17a7eb81896577050831e799d67f03057861364eda64581ab562e186a7f53dec90380d4eb70f8c65ee4a607b0f52f943b7425da5d9f4dd9bb9468f52a9957f00d981cb0b92e04daaa0d135959de3ee37540f7b7bd67ab656c3d84f66c9a77528f8e6c5a59493bf2c5ed09febfb3f9e2be968bb6d38ba635e839f4c6e91a05a837bfcecf5b2fc3232794fd5ea15a62b6e1b5b30b4c97b0fa505dd29e5d2858892cacbb738130881a157d513350f9ec7976dbb9875dd0518c2ec84f015f2159d2e6bb603451ea98c3a55903989137627981fd8305eaeef4dea4d863fe393ecaf30cc231a1f6c0daab5974e4de1a10cd3f49c5ea1ec304d9b35559a4dd7a940e3d0e7a90b0103e52fe8f74d1e000d6b920ce233151af6c9ed57e23431c8e3d3de0d339ea6b1538e121dfefbac2f5fcacd953604093f9d6e61dc994a17a6dae0399afa2f1021fde6c31c9b9cccd34a0cf4579f61ca16e7d1ab83386198f2fd8e64aaa7df6282595eb46614eedc72cc0e515f8b5360e5217a5fe1de6e088971231afa0ca7296ee8d9e2bf841908345d9bf43e71443a02399e108e6e394e3c0e287c0c207add2d17ba78c07908dfbe4e5ff89c0ca7f5370438205260b410fa502ff6ca2c374c9d07f08796737afa5b048f649bd6e5e555300c32deb756aa911749e9d713a981ef7d59f2836f102e973ad94bb8a0976a2d5934cf08f9ffe12f82088d0ef8f25102e4d8611612069c129c502fdc5efa2290062386fa1897a4759e9aba84218d140eab7a0a46f097483cd94381e608624c67e8599185c1b5352719e80c538ffe0dddafe387335fe6376f85e425799845f11a398fa9ae2222387c9f29c70c0f7ae3538c5ed6a3b5100b6f720093dd1bde1e4ce6a17969d90675746809eaf18788a217e4add04e2c4ee917ec7a76c23c6a5d0363c6759c06136bb1d9cc9ccdb04c5fccf28738b16f93dedc2fec6fc01b9bf6a397de113ca8c86f9955b388f172d25d99dac3547f32f0900c29ee4bd022d7a485476b4f1b25bfd98c0b5f02e098b3eba841724ebc1e9d40b03742a80522545e5b5a8d0f08608906011cc36c168467cf8d25ead626de1d34e0be49affaca91682e07fdab4dab121c9e38298e8b82624f4149926ddc8a4210b7fbb622ca6c61ebb2ede96457dd308aec2978844e092271a865831f38c40fa6d633eddca8b221ea4e2b4b18ecddadcdd0a069b51d229346f50f6968a0eb403235d82126a94f1485ea1d69b6c8d7f6e8ef43400dd76bb28f71caf8cf78658535d53f359f210590c83f86468a698843f5b3f8160560f14c8c4aea26d31138d2f6a5bece243c3f8a53379e9e0a6122f896cc6a8487179f8e1e40024c44362b753b3ba7b7030454d3b77f042aa532dd4b8a112f34d858875c368d5f2a2ad3343df43727ff9d8424c2c6153651f0bce56cd95ee8a34ed87fff817605d34d880130474451155f78ce899ed3b5564d36daff078500a503cc22072e601e9f941ec8a56d111d9cc5657177b77f5d8c61253324e33801e59d4663ee41691ce07cc367fbd7b5b5753124d5734fdadd348c1938a52f28deb0fcc5ab0334cf168c613ae369b06a20d036141745335d28865381389fb5c0d082a558365323316427b0b7502033b222c5261639a82a67db6c8e813d9aac4fbd4b891f2f036e68130d89da5fcfa37ba82d8fadb6e266c5da93d4f533714f85df75da33b722dddf967531bf813e5808dcfe61a2e5bddb04f17bb62d3ca0e9a33582b89a9cf6fbac2ce468d171b653669ba60714b2d45faa43d4c620f69fefce03c4bd5dc0749fc89c7f135040b438f93b58636a7466a32954271fe64070d9ad07ea06d24b1c23699709c580377afb31735c853693c68c75db6dbac9de92316870107d6e295d1ff8e1ac388fb273e51a7aa9eabfaac239abe62be8dd5c7e0ce479218bc58ca4f075b5b35b6a367d95ed627ebbb75703213cccc1da1c4d0ff7e893bf6bc87656967cef9662ddd35957a186f35d11ba1216112ac87f8df7db0c5d3ab7132f38bb508ffafaa55290d460e02d89f43b41195199b33bfa57781d9053e55d4aa2410de7662f4334c03565a727a6f62f19584d0cfb494d3e19a67a1dab58dad5cd65752f95fdc0e41ba2727628d8d4b3ce3b553671f2a75df115677a5b7ca106f8614f2f39c126e60ef3ed45ae8c27f0ecd823bc3e5696e04658e770938dc26002e892b6a565a86d3b5b7bac71641aee5ba6028b37943c3ca2cbb19c2a665ba50c82da53ebaff640eef7c2c959580da4a230ef72465ae2591dec9bc2ddcdc9826abf2c484f7f23a3ea1da3b26df9d8aa4a4f1b88a5cbf2fa36693df29692764addce85734fdc60d092b1aa2115855914ed303dc5e40940bb9602b68159971449c0f00b7b32f1979be789cf90c1d27bdbf89288863dc47713ee07bffd4fa11a5f9f3e75e868262476ddc13877b1342b7151f7845b1ffc72c47d5ffb2677ba5c4e557c7b7e611309f49e39da2c40607ef10f758fed0b028c4211a65eb2236461f3e2d199cd597f7c81adc0c8e312890c5ebdeac804f9dda61c197033631514565ba80fa5f342b398567174a0e05d91ef7555b0b397b8112bc5a9dc451ee2041cb58b52a1beb81c0d1dbe691f1827c07d6067e0d284a7b07617377ee780cd1e155b6516c0b81ec57e32a9c225850e262123f6d16245ac768f19e45ae740ca4800aaf56662751fbf917321b1546f75f317aceea45b0b4ead872abf34e3129125f2c73e4a5026b78", 0x1000}, {&(0x7f0000000280)="e19f7c0fc0371d", 0x7}, {&(0x7f00000002c0)="9a7615eda74e86586a419f36e3158ad930e3be12fe14a5b9dad6fce5cd1b6a26fb2b529f030c3edb9110b709fe3f7a88e013aa", 0x33}, {&(0x7f0000000300)="7c6b7acbd7b076e086", 0x9}, {&(0x7f00000003c0)="9299297ec79463756f783ae29bad61fd7f5b7ded2e6173eefbd68ad34fc2333709579d3f9cb512cd87fc3be9fcbc23e344d1266517f276b1a1b436fb3f51ca14c8fe1b20ceb924c393867bcdacae05995790537781c426df7b6b7dae0d08913b15f7a0e3315d37a94d8d775c1b7001c45cea6750b24c4861cf51ef23388d30f1ea5a5c49b8142b912d096340c899807bb44e3ca75600768a4e5365c5107f19a095bfc344ee34d8ed5c1a8242fc90846bb34fe6612720e4c6aaeca94f82dbc9681a9e94fbd09ecc58eb", 0xc9}], 0x8, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) 22:45:14 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) rmdir(&(0x7f0000000180)='./file0\x00') ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000180)={0x27f, &(0x7f00000001c0)=[{0xfffffffffffffffe, 0x3}, {0x3, 0x7}, {0xfffffffdfffffb2f, 0x3ff}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80047601, &(0x7f00000002c0)) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_names\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') r2 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockname$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000400)={@remote, 0x0}, &(0x7f0000000440)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40005400}, 0xc, &(0x7f0000000480)={&(0x7f00000008c0)={0xdc, r2, 0x100, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0xc0, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7f}}, {0x8}}}]}}]}, 0xdc}}, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:14 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) pipe(&(0x7f0000000080)) sendmsg(r0, &(0x7f0000002fc8)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000010007fbdb72d1cb2a4a280930a06000000a84308910000000e00080008000c00000000001900a30700000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000006000)}, 0x0) io_submit(0x0, 0x0, &(0x7f0000001300)) 22:45:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@sha1={0x1, "6cc3d87e1eae357d1fc2e135bb4179f89d1dac73"}, 0x15, 0x2) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:14 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') gettid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000004c0)={0x11, 0x3d, &(0x7f0000000480)="888e36618bc9ce24e6f9c1bceec9d5103e72db8fe6715087b264a8473168bea2db03f590bdb1e247bf70f95a369e4bd3b0b892283202e63364efcfb036"}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x141000, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r4) sendto$inet(r2, &(0x7f0000000400)="4e1834e8a912c4a0bd1acc07287dae8908e5ddd8c23726b223fc211e57ec620a96cf7e4adbd654d49c45de026725ab65643f767405719d682ed65f5f755136a116fcc0e6f35250369586f8ccb5480637ea7f0bc82d6b20635019ac7544e78d4657a384d8c02a0671353f0d5f3359f387a32d6bb83baf19ec4efa9490", 0x7c, 0x80, &(0x7f0000000200)={0x2, 0x4e21, @remote}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$dupfd(r3, 0x0, r0) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r4) fcntl$getownex(r5, 0x10, &(0x7f0000000000)) connect$netlink(r2, &(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbfd, 0x82000000}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)={0x0, 0x0}) r3 = getpgid(0x0) rt_tgsigqueueinfo(r2, r3, 0x34, &(0x7f0000000340)={0x17, 0x933, 0x0, 0x400}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000180)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) socketpair(0x0, 0x804, 0x2, &(0x7f00000001c0)) request_key(&(0x7f0000000200)='big_key\x00', &(0x7f0000000680), &(0x7f0000000280)="93", 0xfffffffffffffff9) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/policy\x00', 0x0, 0x0) [ 681.446778] netlink: 17 bytes leftover after parsing attributes in process `syz-executor0'. [ 681.461022] netlink: 17 bytes leftover after parsing attributes in process `syz-executor0'. 22:45:14 executing program 5: ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x0) 22:45:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) r8 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendto$inet6(r8, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000040)=@req3={0x40, 0xfffffffffffffff7, 0x4, 0x3ff, 0x1ff, 0x1f, 0x7}, 0x1c) 22:45:14 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000080)=@nfc_llcp, &(0x7f0000000000)=0x80, 0x80800) getresuid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@remote, @in, 0x4e21, 0x0, 0x4e24, 0x6, 0x0, 0xa0, 0x20, 0x7f, 0x0, r2}, {0x1, 0x1, 0x2, 0x9, 0x1, 0x5, 0x977, 0x12}, {0x7, 0xfffffffffffffe01, 0x8, 0xbb6}, 0x7, 0x6e6bbd, 0x1, 0x0, 0x2, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x5e}, 0x4d2, 0xff}, 0xa, @in=@local, 0x3505, 0x4, 0x3, 0xfa, 0x3, 0x1, 0x2c1}}, 0xe8) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) ioctl$TCGETS(r3, 0x5401, &(0x7f00000003c0)) fchdir(r1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') write$tun(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="000088ff010000000900bfe2050000dff7e435e8000000000000000088a07b9567df9531a1cd462006eac0ca756de70f9321e6eda40565322187a7f139b2ad00d0505ae233b06ef96dfbe1e780d01dae31028d175c75fc75122d7e0470c524c3f1ca9a1f4edd"], 0x66) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x0) 22:45:14 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x1, 0x3}, 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:14 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:14 executing program 0: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendto(r0, &(0x7f0000000380)="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", 0xfd, 0x40, 0x0, 0x0) r1 = open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', r2, &(0x7f0000000340)='./file0\x00') r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000240)='./file0\x00', r1, &(0x7f00000001c0)='./file1\x00', 0x0) 22:45:14 executing program 3: keyctl$session_to_parent(0x12) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) r1 = open(&(0x7f0000000040)='./file0\x00', 0x2400, 0x100) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) write$P9_RLOCK(r1, &(0x7f00000002c0)={0x8, 0x35, 0x1, 0x3}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) futex(&(0x7f0000000180)=0x2, 0x5, 0x2, &(0x7f00000001c0), &(0x7f0000000200), 0x1) 22:45:14 executing program 0: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) setrlimit(0xb, &(0x7f0000000000)) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3c) r3 = syz_open_procfs(r0, &(0x7f0000000040)='net/udp6\x00') ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000080)={{0xa7, 0x1, 0x655704d6, 0x800}, 'syz0\x00', 0x40}) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2}], 0x3f, 0xfffffffffffffff8) r4 = dup2(r1, r2) fcntl$setown(r4, 0x8, r0) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f0000013000)) tkill(r0, 0x16) 22:45:14 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:14 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000001c0)=0x1, 0x4) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'\x00', 0x2}, &(0x7f0000000200)='nr0\x00', 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:14 executing program 4: gettid() r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x20042, 0x0) r1 = getuid() r2 = getgid() fchownat(r0, &(0x7f00000001c0)='./file0\x00', r1, r2, 0x900) perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r3, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) execveat(r3, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r6 = inotify_init1(0x0) fcntl$getownex(r6, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r5, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:14 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e22, 0x6, @loopback, 0x1}, {0xa, 0x4e22, 0x5, @empty, 0x6}, 0x1, [0xed96, 0x90, 0x3ff, 0x41c, 0x4, 0x3f, 0x8000, 0x4]}, 0x5c) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x30) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000008c0)={0x7, {{0xa, 0x4e22, 0x5, @loopback, 0x4cb}}, 0x1, 0x5, [{{0xa, 0x4e23, 0xdd6, @empty, 0x1cfc0000}}, {{0xa, 0x4e22, 0x5, @ipv4={[], [], @broadcast}, 0xff}}, {{0xa, 0x4e21, 0x3, @empty, 0x8}}, {{0xa, 0x4e24, 0x4, @local, 0x4}}, {{0xa, 0x4e21, 0x8, @mcast1, 0xffff}}]}, 0x30c) [ 681.970129] device lo entered promiscuous mode [ 682.516201] device lo left promiscuous mode 22:45:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) r8 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendto$inet6(r8, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000040)=@req3={0x40, 0xfffffffffffffff7, 0x4, 0x3ff, 0x1ff, 0x1f, 0x7}, 0x1c) 22:45:15 executing program 1: r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000840)="bacb922d78d802271222816028fc860d2b294c3a1a88510a44fb9b619477f2b75c665f3fa28c6aa02fe851b6f12a07e15341b62700e6ddea4651af2227c4a50c6fd469e6f77c62b9094bbe22061a462e89a471592191cc565080990e57b6f997a5f11dba69acae587dea826349dfd7b0a66947a5f589aef345e1fcbeb8434f75ad6435bf309d00a234cec0de4f1c3330db720931d6d54d3ef46f49c4f9e78aff40c4dcde8d4e4d5291dca3659598fc00b3bcb01ba06cd79d45b48043a8f19a8c598311b77402a673505e429a0d10dba96b8ba1f3ad58bfa9864f31fa328289a3840cdbe2493a06bc5851a63f016a", 0xee}, {&(0x7f0000000940)="8f85f00b725b07d6dba6fbbff651e1b89f371eec84f4432798a0a80c6c7eb35adb2fe346254d470fa068d803acd44638329b827a28e8846337823e8f002f2e667652ae3a371dd9eab2ea6ad93678fa885a30245a87963fc9a8936a1e0f44c69c418b4f99f9a0c6f2059aeaac85d8689c551f554aa82f0a7e3bfb44f474cbfd13c4f0e0a3da253a9ed15b973540b0bef7fe6f44531295b0cb6a16da447394821670121cac264bb446a6c5c255a58c77aee53b7b4bb7c63d4ae293686ec85e3156cb43d51a4ec5a92f20b1c669957d91e032565d066401c87fb413d5e7529db2d4309b4ff00ec6c36cd7dcb3939239", 0xee}, {&(0x7f0000000400)="84b47a3c954738bdb1bdc301a66f9d45c8caac1f4a452f33e08cb151f1c26196d6b758c914370acb6b64aca23d1152b1f96dbd3757a4fbb9c0d3abf2a0e2a32a8c658499bf3b6e73036b17cc5a8c4e7e36f686cf5a8ec53ff977d9877d224a29ab65aaccbdc3decf7420d5c79bc7fb12c0bc4ce86627a88734f420a4fefe922f6e03279c", 0x84}], 0x3, 0x8) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) sched_setaffinity(r0, 0x8, &(0x7f0000000200)=0x4) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:15 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='./file0\x00') r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x10000ff, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) mlockall(0x7) fsync(r1) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') fcntl$getown(r3, 0x9) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) pipe(&(0x7f0000000280)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r3, 0x50, &(0x7f0000000180)}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:15 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x914584c34fccd49, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000280)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) io_setup(0x333, &(0x7f00000003c0)=0x0) io_submit(r3, 0x1, &(0x7f00000000c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x7, 0x400, r1, &(0x7f0000000140)="efbda8d10b7ef8094ee872933e561615d3ea18c7b490ee9ecc74f76edbc6eadeb78d71c5de317403e20af4067880e3c9216f9b9bc941c3f57998624e65ded7239c3f3cfc79c16365757244822d089c4adced42162eecc45805a92b86c38ca8eb616e283e2da8830fa11375872d31ac0888d17459025d9e67ab5d011530f5e9b3b7143810283f3dd3e18052051894489f55074a58abd4fcb3a00c98d8c9f11d2969237d5dbecc0871dd02c4395edbb1d870e698885c9355c19e5cec199c93261f14f069215d73a6628b43e9296a7b52ae3b1baec938", 0xd5, 0x1f, 0x0, 0x0, r2}]) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) 22:45:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f0000000040), &(0x7f0000000180)=0x4) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) [ 682.562309] device lo entered promiscuous mode 22:45:15 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/uhid\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000640)='/selinux/avc/cache_stats\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000780)="49505653001721239f668a2ddce407eaf2714691467ab34cc7450cc66860128bd939acbe3c0531ffa385b2f4dc3990468e51d15499b4e76d3398bda628c7664be02af2461b2c4ba89249e4930989d5a02ed68b293a7fbd2fe55c050000f2e46f88e2b6a345d02f45219de1969cb7533bb01bd1358ddee5dcd87dddfc1f938a", &(0x7f0000000700)='\x00', &(0x7f0000000500)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x400080, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) accept4$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000200)=0x14, 0x80000) sendmsg$nl_route(r0, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x88801002}, 0xc, &(0x7f0000000400)={&(0x7f0000000280)=@ipv4_deladdr={0x34, 0x15, 0x2, 0x70bd2a, 0x25dfdbfe, {0x2, 0x1, 0x20, 0xfe, r5}, [@IFA_CACHEINFO={0x14, 0x6, {0x1, 0x5, 0x8001}}, @IFA_BROADCAST={0x8, 0x4, @local}]}, 0x34}, 0x1, 0x0, 0x0, 0x40080}, 0x40) [ 682.814795] device lo left promiscuous mode [ 682.926171] device lo entered promiscuous mode 22:45:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f0000000040), &(0x7f0000000180)=0x4) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:17 executing program 1: r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, r0, 0xc, 0xffffffffffffffff, 0xa) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:17 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000080)=0x7) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:17 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$netlink(r2, 0x10e, 0x3, &(0x7f0000000180)=""/64, &(0x7f00000001c0)=0x40) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) r8 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendto$inet6(r8, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000040)=@req3={0x40, 0xfffffffffffffff7, 0x4, 0x3ff, 0x1ff, 0x1f, 0x7}, 0x1c) 22:45:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) r8 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendto$inet6(r8, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000040)=@req3={0x40, 0xfffffffffffffff7, 0x4, 0x3ff, 0x1ff, 0x1f, 0x7}, 0x1c) 22:45:17 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64EXEC\x00', &(0x7f0000000180)='\x00', 0x1, 0x2) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:17 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) 22:45:17 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) syncfs(r1) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f00000001c0)='(]keyring\x00', 0x6) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r2 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) write(r2, &(0x7f0000000040)='\v', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000009, 0x11, r2, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$int_out(r2, 0x5460, &(0x7f0000000000)) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:17 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) [ 685.030448] device lo left promiscuous mode 22:45:18 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x101100, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f00000008c0)={0x8, {{0x2, 0x4e23, @loopback}}, 0x1, 0x5, [{{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e22, @remote}}, {{0x2, 0x4e22, @broadcast}}, {{0x2, 0x6, @multicast2}}, {{0x2, 0x4e20, @rand_addr}}]}, 0x30c) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:18 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) timer_create(0x7, &(0x7f0000000180)={0x0, 0x3e, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_settime(r1, 0x0, &(0x7f0000000200)={{0x77359400}, {0x77359400}}, &(0x7f0000000240)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) ioctl$BLKRRPART(r2, 0x125f, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ptrace$getsig(0x4202, r3, 0x1, &(0x7f0000000140)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000000)) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) [ 685.205976] device lo entered promiscuous mode [ 685.239963] device lo entered promiscuous mode 22:45:18 executing program 1: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/relabel\x00', 0x2, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:18 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x200040, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000140)={0x99cfc3f3a122972e, &(0x7f00000001c0)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) creat(&(0x7f00000001c0)='./file0\x00', 0x8) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') eventfd2(0x8, 0x80801) setuid(0x0) write$P9_RLOCK(r2, &(0x7f0000000180)={0x8, 0x35, 0x2, 0x3}, 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') fcntl$getown(r2, 0x9) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) 22:45:18 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) openat$keychord(0xffffffffffffff9c, &(0x7f0000000180)='/dev/keychord\x00', 0x80, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:18 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffffffffffe, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r2 = dup(r0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x4000, 0x0) ioctl$TIOCLINUX3(r4, 0x541c, &(0x7f0000000200)) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RATTACH(r5, &(0x7f0000000180)={0x14, 0x69, 0x1, {0x0, 0x1, 0x7}}, 0x14) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r6 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000340), &(0x7f00000003c0)=0x4) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) r8 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendto$inet6(r8, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000040)=@req3={0x40, 0xfffffffffffffff7, 0x4, 0x3ff, 0x1ff, 0x1f, 0x7}, 0x1c) 22:45:18 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x200040, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000140)={0x99cfc3f3a122972e, &(0x7f00000001c0)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) creat(&(0x7f00000001c0)='./file0\x00', 0x8) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') eventfd2(0x8, 0x80801) setuid(0x0) write$P9_RLOCK(r2, &(0x7f0000000180)={0x8, 0x35, 0x2, 0x3}, 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') fcntl$getown(r2, 0x9) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) 22:45:18 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x80000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xf24fd363a9a8aff}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)={0x24, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20dc}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4000004) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000001c0), 0x4) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000500)={'ifb0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000006c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=@getqdisc={0x2c, 0x26, 0x0, 0x70bd25, 0x25dfdbfb, {0x0, r4, {0xffe9, 0x5}, {0x3, 0xf}, {0x6, 0x5}}, [{0x4}, {0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:18 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) fstat(r1, &(0x7f00000002c0)) getuid() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) r2 = geteuid() setuid(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:18 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x1, &(0x7f0000000200)=[{0x80000001, 0x9}]}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) sendto$inet(r0, &(0x7f0000000180)="8ff145e2a5d02d69c9474a664d00da2fe71b1772f97eec876bff28d90bfbd798d01d52be209fed73420a775e3c9ae1c738f5bc086e0ac4e590b19953c8", 0x3d, 0x20000000, &(0x7f00000001c0)={0x2, 0x4e20, @local}, 0x10) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:18 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0xfffffffffffffffe, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) umount2(&(0x7f0000000040)='./file0\x00', 0x4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000580), &(0x7f0000000640)=0x60) add_key(&(0x7f00000002c0)="7558540f5e", &(0x7f0000000340)={'syz', 0x2}, &(0x7f00000003c0)="0a57ca6e182abb2b04277c39d3cf873a1eb8710b84717892f78662436725055548048f343c24d6cf5dac70338a5a1792c5d67a663b606adc1b74690b03ca289fa05322a595c1854e01019961e045c46171414d1ef739409bffc90b9ec2544199e562b1f7f3fca3a16b9b802b6e201026d2b481986f8f730df429c1189dea7d01bbfe4739fd4bdedefd96a2e7a69e164d4e4e3522eeb680c42ef3e7e05f15998dd9d586254744628ce8b994fae6ea7f3302135b3a475a690c1a6bf9efd8cdf43a6ae256f4e6afd56cee5a247e898d9c080d32c7290243fb0a663fa3563f3eba2b61", 0x19b, 0xfffffffffffffffb) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) r3 = fcntl$dupfd(r1, 0x406, r0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@local, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000180)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r4, &(0x7f00000001c0)="0efc0016a63e47e94ff9849aa3801c9202624d718700c8dd4126c2d1a1fcb2d0168000d035383f18d15b14f9652300887ba20b21e5fc0a86a208984c883df93b25bd8f0f21f93aab5fa5142644778fca1c28194eab76edbfbb94374a684a86a18a3c85298d585026603adb472d341204c33306442733b74d334f02c7e71228", 0x7f, 0x4010, &(0x7f0000000280)={0xa, 0x4e21, 0x78a1, @local, 0x7}, 0x1c) 22:45:18 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f00000001c0), &(0x7f0000000180)='cgroup\x00', 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:18 executing program 0: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$netlink(r2, 0x10e, 0x3, &(0x7f0000000180)=""/64, &(0x7f00000001c0)=0x40) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) [ 685.874983] device lo left promiscuous mode 22:45:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = pkey_alloc(0x0, 0x1) sched_yield() pkey_free(r1) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x882, 0x0) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x5000204}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:18 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) fcntl$addseals(r0, 0x409, 0x8) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') open(&(0x7f0000000080)='./file0\x00', 0x200000, 0x41) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x80800) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x100000000}}, 0x18) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_get$uid(0x3, r2) 22:45:18 executing program 1: r0 = gettid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x530, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) fcntl$setown(r2, 0x8, r0) pause() execveat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000400)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x1000) shutdown(r2, 0x0) accept4$packet(r2, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000006c0)=0x14, 0x80000) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$sock_proto_private(r2, 0x89e3, &(0x7f00000001c0)="950f0d2460f40d9f7bd3bae6c1f8304dd4abe7028888727fec3dde600ae877d65438fb055fa1eee498e62648801bdb320081fb84662797") r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') ioctl$ASHMEM_SET_SIZE(r2, 0x40047703, 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') tee(r1, r1, 0x9e50, 0xd) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f0000000780)={0x50000010}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000500)=0x504, 0x4) ioctl$BLKTRACESETUP(r4, 0xc0401273, &(0x7f0000000600)={[], 0x9, 0x7, 0x0, 0x100000000, 0x7, r0}) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)="000000e8a5c7dc000000", 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ptrace$setsig(0x4203, r5, 0x401, &(0x7f0000000200)={0x16, 0x0, 0x100, 0x1}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup/syz0\x00', 0x1ff) lsetxattr$security_smack_transmute(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000480)='TRUE', 0x4, 0x1) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000280)=r5) remap_file_pages(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x4, 0x0) 22:45:18 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) getsockopt(r0, 0x3ff, 0x3, &(0x7f0000000400)=""/140, &(0x7f00000001c0)=0x8c) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) write$P9_RLERROR(r1, &(0x7f0000000180)={0x9, 0x7, 0x2}, 0x9) [ 686.042447] device lo entered promiscuous mode 22:45:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) r8 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendto$inet6(r8, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:19 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:19 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="4d320021492fc1f24922fb6bfd4d5ad38ad174b604842fc379cadc0948ee4e6b94fcdb", 0x23, 0xfffffffffffffff8) request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='lovboxnet1%#-\x00', r1) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000580)={0x4, 0xfff}) inotify_init1(0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)=0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) getgroups(0x4, &(0x7f0000000340)=[0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) write$FUSE_ENTRY(r2, &(0x7f00000004c0)={0x90, 0x0, 0x1, {0x5, 0x2, 0x1, 0x81, 0xe767, 0x10000, {0x1, 0x7, 0x200, 0xe9b, 0x59bd, 0x7, 0x4, 0x3, 0x5, 0xff, 0x3, r4, r5, 0x4d3, 0x55}}}, 0x90) r6 = getpgrp(0x0) rt_tgsigqueueinfo(r3, r6, 0xe, &(0x7f0000000240)={0x5, 0x8, 0x3cf0, 0x8fe0}) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) 22:45:19 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:19 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) r2 = socket(0x3, 0x80000, 0x183) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000002b40)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002c40)={0xffffffffffffff9c, 0x50, &(0x7f0000002bc0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002d40)={0xffffffffffffffff, 0x50, &(0x7f0000002cc0)={0x0, 0x0}}, 0x10) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000002d80)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r4, r0, 0x0, 0xe, &(0x7f0000002dc0)='.vmnet0proc{)\x00', r3}, 0xfffffffffffffe3e) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000028c0)={{{@in6, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getresgid(&(0x7f00000005c0)=0x0, &(0x7f0000000640), &(0x7f00000006c0)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000029c0)=0x0) lstat(&(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getegid() sendmsg$unix(r2, &(0x7f0000002b00)={&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000340)=[{&(0x7f00000003c0)="69ba57829e5ed95c69b42db47ffd50d8f38d344ff640a1b980615762e05919dd26fcee8dea067306ef07e2fa9e634e4d4235ba2bf737908fca212aabdc52965bc5f85db83ba2", 0x46}, {&(0x7f00000008c0)="82762bf245ad6e052a0b6f596df7bda9888921fc3b8df733cd722f8f8e8a081848f6acfe22ba65fcf45db7b94f3e02064057b1e13fba09ab4a1cb0b45345dc54a3db2e6dde0b3902ada837ff3796447e324214fb122b9bc3776f2029fe0fba558852fdaec6683cfb6f68c5c188656c6352aae10c290d759b26c457dc1881bc7ed8de4ee3abfe80e0da8101de8915cdc58d1f69e0b2a7878bc27678e79ad3c3479dafd947cd48e805fd77638ecb93afdeab196718031b9cf12124dfad7c4a3b36194dfc638481f4ff393416180eea2b2d047f57c815b8689fa249355fbe431de0fa36247e17cbbfb1c5e29fe547fefe97d542da9c5fa7f7a7524aa48f41cc848566ba3a9c12c30fd13d3ff02280e17a3d6bdaf741f769b2693668d9068e7ce08314e180f8723c839179b3e86e5959bc1cb53ae9c8c20ad88d63151ae10db8f65097a8403b383a8ac6c3329b8b5b4c43037e94877afb9e72e301c5c80fc6a6dd32a165720330f1b7730ca34cb33e1ab41096ebf58ca5a34c73e073366b54ff32b62109288478ebda9090dcd063bb2246b9aeae1a72761095dbc88b83743551c74bab944bb51c608469d215ef625babf98a5d92e1489ddd381cc8aba38db3d47c4da54d4986b5d14d26de1be66b844b4dad96a2d47c5ad7bf6cf3e5f501e38f7b4031a68ea81062c0b3b654cd1d81ad7baa6ce42d2991ff2e2f2da63414128722358cc8668469f806a462747f8ce354e1748f2c3ba377592cc929bfde4efcdd4b2f6b205af491cf5d409e855e19a847fc42da76c1d91150628080079deee25f48c3ffb0d84d16104d0e488f0c51729c83177b428592d194ff82237c6e3d0b9707c57aa986cc276aa49cee711e3507834f66bbc262ad90282585e53c33da3e4632fd0743e918460b9f40d0972c86aa5706730dd2ea683f819724ac409124a99776ea95dc1bf97eaf134384008bba0a7acffa8ec08f5de0b724fbd9f33fed72160082dd5a40a8b1dad9a7848e6c2cf32038cef8865a73932b6c73ea35f8ffec41c9268be586807bdbb799eef4c47e16b05508609b87405098ed832a2f3c68f045f51859462bfa7279042ba79134ffa7c165ce4ef3e1699f05ea28c94222fcd61f8afac18b90c0256b5866fd3fd8ec39270b50aec2e96fadfa6f0089d4e41d5dc627f678fff4d9a4d10127631fece5ede0f61e06d94c38f40eb79f59ec1e4d1df622e9d2b5de9755e1653dc2139eef1f85d573a071ea7e36dad3da04c877acb1e80663483bbad4ea14b99e39ceaa8c33fa63e837f00bab221f990356ea78393fa0a89e1b4d0e23a3c9475b5747cbed71ec9bf57f1c561798f09214094d105161e8ac716000c3c04f982a309f25a67d072626976dd2e7e64bfd4db91bbbf9c12c25d659d7210ad25f6ebbfc50bb98b42133fb78d5a658fc9010b780257168f9d0defb019dab50a3a1d401bf991a929713eacf52ab3a8ec8d7aa96ccd74a1ee8d4230f0a1b987a973aed2bc844afada64724cc219c9508eb97e4d84b4bf341bb7cb5683cf63c6afad26dae255456f166cad97094dba52886d8d3012fcd9733ff6c0f1583e76c5db631fab21a14d97802a2fe6ab2160d5955f082ab8efda0629bcd6ab44093fb667c4d941a716063e220f3ae2ae1da0a15cc244c9439a5d6bd8ceb7cbe6298103d22bb6f2ee192623cead6c2b823e0a1dfe0b7a34c6bd7c585d78578b2159e06e97e813d8d8185278217d5b04e6833c2ae53e8741d106cd2ffe5c439232dda57eb2ef1eb3e1e504741a4193298e32cc1894954f792673de1df424c981d9055f19fd6aba3543c80b02c7373a0d88ac12d09315ac5d0dab2d80704ad146cadadebe340a3b0521b5b437611080df10791750c0dc2a76016fd3daf9ae7114a5806221583c64f7ec63f0f71586bd1bdc8d87d7dba92bff0d95590bfe2acc0f2c9da07a09bffdcffa8c00297dac1d2de6476c8d6fdbc1b237b5c36d54f222df82c3ea7ce7ec149e8a9cdd58c9cc2d8ba63037c6b1376bc94a345458040e61ba5a2e0cee3b99e2674f75892bcaa6de29bc43be5483130730f87cdb0b05ae1f8ac8ad8bf3835c21ce00e7f76b5a55c5aeb5386898420585418924afdd434ffdc1497a4ee969868a11256de175e33df27225b1ee5020e4d8bee9509c9818044c1d1b4313be52c139c52e9af08ce502ee78d9cacac0838c73eb85d8990028d5b2011388a85ed58c985f6700059550f2ad4abd98094d12e3df06a6dd65405a237df67c8289b486b7c7da3b0d196f1d1cee3891ffe5e1fa6947ed0a438a809423667d25b7328201e8f947f89f3e727d2cc7c139d0469d0784595a9d6f3dfea6cfdd0dcfafdf06010eae7e4682b09dc1c73ef4e95c1469366639995349c0e9109512a15b09f6d763d8024e2e8fa37ab4b1956af81480954bc8d9f55428f8b9128ba83658231999c7a2ce28d246046b352584cabc298311529b86dabdeafe211820f119b7f4eed05d1b473c678f52d1ec8e329beeea1b9bbbbe5fcdbb82d9ba34ab09e89bb6b5b07be7d7c6c80f745b45842fce5b155101b9ccf5f072aaf35e054c9e1fd2ba3962a897554c03e850ca8d83eaa8844fa39d9d6cde7956243ff3f1a494e0185306bc3c3197c0fbab517f91ed5cfc3938ab2e59d630ee5e192b1d83d69eb73de109e35ca49e8ba5054641b7ce20ef194887d5a7be3606e3261faebd5e73829c088e7a9732998b0051a6af0f379eed76d7009fe22b84bfee1a5daa4c42ebd4755b8d7c959b5e260d5440e67fdda0ff2ed2e1d2809fd71fd3779ba19580c0c208988e8a454998c481544276653fa98e7dc4b07975896505ee95a3695d57f5178e96a66afd673a01678b43c7ed35aca759ffcba007c8e49170cbe766d04e389cc9fbd857359e15af4344be946112c4b62c5a0b48d37328d033a31a79f9551ee87bd708e46ddb9b06d87a065da3dafb53484b427b683de8ee60b3c5a41a7b553422d3391d24178e03d747aa2331e416ba9206b3379114e0811188337983de0a684f4ce6fdef839b5f894ea61020725f788208b19d7fc09024643e157f2779cf3477c1976d52301dad06e8cb70916a99312a9555a16e7649305875a200c28d2e0b7ff09b8757aa05cfbd07796ab72a7b7dd46b4d77e5dd78686987d4d509d64ad6a66164f3bb79d7dfbf11fa18de6d41fa925f35860eaea42633bf42f936323d793e4cdab1881407ab889f3375209c4cde63a2ffdcc137008d5b3874545cffe707b150c73f781a17032124469c2875b920a14a8124101f9379c83bfdd12009492ce945f3c2eba1abfb16481e4f9f8e1fcb11fef85b7fe4b648f1d69b2e7ea4f4b348271baf96af6a406dc385a2224d17442e3e7ee4cb83d53996b101eece3bdcb26157c72f2f78dbb89095e378fdb3ac558d905ea0cae5741e0a8cacab5cbe822232bb6b5a24d51ca40cc4f8a303122253841b6f24da30a973c146ecbd25265ab194314181d3064734dbb9f533ee2f8957342b2ee56d889853d8e8150d4155e1b96eee5e9a1c84692d7dafd99ca32ac5641f3e470cb1f180cb05deb0b76741efde0320d9dcc89829b477ea5e5220c52fa4403eeccced0cc3e5b5d6498fc80c60b239e11f95782f5d0de19c1ee421fdef15da932357cf5f39fa8abcc5ec2cf937c1c92fd4c67da8e414ce1ab26300d997b6e1a9bf695c40a79a90c9a17ba784a5ae51b869f5c2a9f62dd4359e78642b4c4ea303d723787b40db1c453a65e05ad9d1300685a472e123187e454572f192f1f91c7c909aa248490f6bab0fecde0cac182c9674bc7c65fc5c8810da50764801ca6d8536d3980db37d57c269031e58464526bd38833c583480bb7b6a1ea14be0fcc84768e296c38758cd1f237901e897c8a42b291e68f8e821a27ef8457f90de73b2107bce6abca8cd5b832f0116726f3d35b6aba93ccf9e97a3c14f522200731a7368c2384301d8822a19eb20df5ec0afa4ebc63476e2cc80ed3f4100ba438a352d77590562e087b685b67128ca7cd485873f96eed1972ee90c74c594496ef3da10feb5d37511df17c41103e8953e42d603cc6b378d53ec2029d44ed207e463194151853b2cc33741565899eb684b22fd9f7a334f3d8f8e61ff52e162eba97b8b1bc13a95b4065afb547c16757c3abfdb3f004f8c4c5e436f5779faaf7afdc7be1714f1f4a132aeee23133f58f56afb59f18924cd82f25e1140ed648b50259c6473a5a1f4071181cb31cd5a385a7dfe42448f76985b628c17eeb098113cae3e2568f2cbe3f3ed06e2ae4f1a54f3f1c3013f2d7a90938750a5925426221338c5e35894db75d9e6336fde908e74887cc2174bc4faa53e8a46b44c1f5dc95058b604cac3c123bd1f36a569024c9266abfcf9237c117589cc1df5666f5314438fe0f3b3ce3c48d0525224b7cd2c3cd6394cf6faeacb7e7b9ec65702127334adc4e29304e08948445139a206735406ee68a69d0a60e6fd5a79c118ed654ccbe947610d90b2c1f2ae677a091eb53f0e5c236b44aae097a84ea81b290606df274f13f1a174fe799bdce3e8e438f8f59224109c2976711ab4aea7508313b18ba37431a99e5dc8acad38c3dd6a667b5354e63a06dc7b094a14e52a2a000077304bcb4c770abee52a28e0a471e7c2fead661dd8c66abbedbf4859f0499ef388af909d05cc309665f102ae46f4b867fb67448a697dfca0811807ce0e66eedb48bf2fb069798a5eb4a79178b5e313c36f985fb1e8215a2fe3d23a2c9530d9246147bc33351fbf099f3a7c322299698885607996b2bd16aa6f6779087efa05f6071f4e4d5943b06fcd231e804420f070ed4352837e64977ecb25002b10e226d147841e4a68adc404636659ede23056df6e8e0738bddce83d2791a399dd50868dd449887d4ffd8c3360c40cba1dbfef4a19ff746581ea057de03606efb91412b877cafd768729dd7b0bac3777d5f8a6dbbdace3eea73f49189117da2cc725dccd57de3efe61b5229da5af0e2b30258e8c26fcbc868b27b61afe7166772413c961bd9e1853e596dd8fadd2607af8de7ca232d194fb985fbdb9cb337404fc684595dc86b77a26cdf19242852f295fd998bc357109adaebbbe19d54d0303f4ddd1c46b80d50df00d8a5cfbd7d6272387ef283eb64bbdf6465eec842fddf382c82bbdbeb783a25c9605bb75d5316f3beec8a6847ba7cb0f708f855a7251a8c7086d1fceb693ab39832f6b4ffed21f61c65b391dd9eaba4751c13015d8e025fbd796c63282d18729a190a6796071f5fc021843aa112fb1ba46e8770edf4fab8064c201bd4ead394824fef607287a58195b1a861c8eb9662d24244e620906b148eed61c2879863b4fa4cffbda93b641a6c034920c663a5269a66003254deda646592b956b4e3bd0883c9ca4948a4e5a50184cc2674fc238f00f1d4e9a628107cb8bf23e3dd655d6a536bd7656687c37d266deb0e9217ce170f3490aec576a49536fda1fec814c5614b97aa333fe2da775ec90d071c1aebdc46ac9680c3421d660c27b67c7df53517a26dcc4dd96de14f83b302724f331ed20593686c38d934fc62aca0155a42c013499cf343cebeb178beacbdcb81e788bdc93b3034d7a1b77404aeabc80da0d1fca066b607a920b02bf65601c26ac198444404bf01df268e0eff1f81f52f85e88f57aa6b59a1d6f93cc70d5af450fd22b9def93ca1b07439b3a403c620a2ad91213e12887a4cbf6e8e1afce44aa2fb2440837e1e79d7e2d83a22d4e18db84d37a4ff5e9c0d72207fb6635a33594dfa3cdba8dba8ce", 0x1000}, {&(0x7f00000018c0)="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", 0x1000}, {&(0x7f0000000440)="a6af4492306c808fb866ff76b2398318888405def0c6a5882a1d0c0232edaa4673a3561130e4c60a030365f956fdf9cd2cfe09a42c6e7097cf2a9cb3e81e62ce94b96bb7f9410e72ce02672723598eaa647d010f0fab09dcca8e103050bc6e43d43114f26312", 0x66}, {&(0x7f0000000740)="fd560ba3e0868313bb9d0ea0f65263a9c645595126d3f0662ecbc9b4ede4ff9607ece75074e631178c84e4d9d770ae24c465ebb823615f8c85ff7c946c1c18dfcdfb6933c576617d8fd484a0944245c1bea238ba3951c44d5ada7537f888cab2adc936aac2796cbce83a4aa44d973001fab6ae13f13d73386c0a78ac83f4a6f0c3df8f1508e21b12c16cde96cd967ddf78fd377d73f400c20b357d44fa4d341c68aa783e765c099fed6c3ebe2bdf7315205bb1e4610b29", 0xb7}], 0x5, &(0x7f0000002ac0)=[@cred={0x18, 0x1, 0x2, r5, r6, r7}, @cred={0x18, 0x1, 0x2, r8, r9, r10}], 0x30, 0x1}, 0x0) r11 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80000, 0x0) ioctl$KDSIGACCEPT(r11, 0x4b4e, 0x38) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r12 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r12, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) getsockopt$inet_buf(r12, 0x0, 0x2f, &(0x7f0000000180)=""/77, &(0x7f0000000200)=0x4d) 22:45:19 executing program 0: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8, 0x35, 0x1, 0x3}, 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:19 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'team0\x00', @local}) 22:45:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xc042800}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="a4000000", @ANYRES16=r1, @ANYBLOB="00002cbd700008000000050000001400020008000b000a00000008000800ff7f000068000100080006006e710000080008000900000014000300e000000100000000000000000000000014000300e0000001000000000000000000000020080009003700000008000b00736970000c000700714ad2a10200000008000500000000009db8cbb3b27e307d66fc1cb3080001000a00000008000500400000000c0001000800050004000000"], 0xa4}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:19 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000180)={0x17, 0x1000, &(0x7f00000008c0)="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"}) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:19 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000280)="2f65786500000000000409004bddd9de91be10eebf000e0e281ab42fb897c0d554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a984237d092ef1c00b517026f8bd7f2b0436a4c40960ab3f6bc482809f6bd82caa34799193b35445293b992ab5e44573eef5fd0f423a5cfb386f9cc996c6effde7e603fdeab448671b63bec6e9395aabab4d045f1ad982a2a897fafa710be9e681f3c6a45db03d9e6cb58fbec3d8397005f17d6f7afa102ded1837bcb805600000000000000000000") r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/exec\x00') clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L+', 0x800}, 0x28, 0x3) ioctl$KDSKBLED(r1, 0x4b65, 0x80000001) write$selinux_context(r2, &(0x7f0000000040)='system_u:object_r:dpkg_var_lib_t:s0\x00', 0x24) execveat(r1, &(0x7f00000000c0)='\x00', &(0x7f0000000280), &(0x7f0000000080), 0x1000) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)=@nl=@proc, 0x80) sendto$inet(0xffffffffffffffff, &(0x7f0000000480)="43cf08d986b036b594aca368bc2dd88ccc1f1da4a9a9351f51b26e127281350996696ba73bd841f4f79f3a009e1a62aa5d7de959aeea9b35b7c2a0a4361311a666e6dbca69c33ccd7be914cf419f7e85390a64697a52c49c2aa9c3d72841fefd2e1c54828d4e6a2de7fde6ca5090ecdacd286f5cd8c03f63627a2d8b342230a82e55b045b85ea197a5ac114ea9f7db5ced2dec40195b7a08d59c75fda41eca9f80e6b9b12f561b18e9bab9312a57343698799f9362f4e35b121108b2dad15547f247b97dec889324fa1c9f9d37ce0000000000000000000000", 0xd9, 0x10, &(0x7f0000893ff0)={0x2, 0x4e20}, 0x10d5) [ 686.714165] device lo left promiscuous mode [ 686.752675] audit: type=1401 audit(1540766719.640:147): op=security_bounded_transition seresult=denied oldcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 newcontext=system_u:object_r:dpkg_var_lib_t:s0 [ 686.837659] device lo entered promiscuous mode 22:45:19 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000940)={{{@in=@rand_addr, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000200)=0xe8) setreuid(r1, r2) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) listxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)=""/51, 0x33) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') getsockopt$packet_int(r5, 0x107, 0x14, &(0x7f0000000280), &(0x7f0000000300)=0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000a40)={{{@in=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000440)=0xe8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:19 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x400000, 0x0) r1 = fcntl$getown(r0, 0x9) waitid(0x1, r1, &(0x7f0000000180), 0x4000000e, &(0x7f00000001c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) r2 = getpid() ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000380)=0x7fff) clone(0x0, &(0x7f0000001180)="31ff6553ebca502f9d088fd11f9e6649db0280a6a2038ff55a5d2f5c5b6c37e0e5d1c512c71d8c348d41711461d59aa2ff9490860a6cddb2f7a5f34c5faaa35e2412203eaf1147f1a6e709e2d094f5247aacb324421f230c82952534aa418e4303cb4c17d5bb84a05ac389bf8c5c6c659b7fe12c79ce89360ca7fdb26211e44ca18d4b567d69c4c0c8fdba9bec63e92ae8c0f70f9c85a3d5b6b69b2a0f035fe86eb47c60f72fe08eef0b1a4169ad669b2692261d688234ed559f33e271cc4a74134087442ba7599596c64b3ad31ff40709fcc5eafb446533667c8b631193d425a271bb7ead04b92e7cca6b0174a7e036ecd1e6197e3ae2ec37fc1c9513fa338e9be2b52f54b2fc2c3b563e0c07fd651f60d565c9bd651c14ccc7b253a848e06447091fd4283051f922415a1627acfd23bbb3fa346ea0ddcb97efbc9fa095f8ca4a2dea40cbc2cb7e4a9c51049b08a17fbb11400d7ec96dc2fa7c847fe075b2bfc4fb926dd672753e246b50df65d5a1c27a9c45ebaa38af67fb6dd49272662dc2ad8ec69aaa65571c5a07c49d4f9adfeec9887bd4f2e3eb4e1d1dcc1e0ea69d6732866085771e629ad0bb252395db44d0aa540b6307ac9482c278b79169199d288011cd9ba05b261845a7258d26501653d51dab86ebaa8da9759890f5ba272ff5b0177bb08cd00bf3093b308960531f38f89f3df1d11511741ddb49515d28d36c31c66a6074e5de4b6a84c14577cae19b8913ee3ee4409f8c582377efee9c852cdab4663f1e3ff30eb62c49715ecdd1844189752f96b7721cc60954579adfaf745be995fe60983635b11af0106c48541016b645cfc10ee9517bb725c931af2bd37e20652cd7cff80acb894da41d46bf8ec244a134706567d09b54c8ac4b9db686943fae0c09376d3ca86d8135680c092c563d15d00687184ec24d542347f3f80401e9c72be63ad4913627009cb204cb1813e6aba3a59a2ae430f5f0d064231f479bf76be11e8b4cef454c3843edd67f39a8623d466a2a9132c04359889e0a9cb7e0207429f0b06a55a730337c58a45118b6a727173530a6c2a9a565408cc03c8eed75ff3421b1a40080381cb3fec4c4f9fe58e3d2e3a9d334eb9e673311c13ff4dc105819e63dd63553a35e4a0fe3a48f28a09e61838473598a428f5b0532f273f6fd07233450e6efe6320ac8ff7a159b454103133843846d32cdb0040ba0d6eff3cbe59a81bd3b24a8b9c32cc796ce8ca8e4ea2291f4e4c5d27ddcf5edfdab0698e118ca64c15f8a11f66bef5848c071398e741dade602042c640c22ca60d75359407ee193d10662eb1452ef2ce972b41642f746f453fccf0dbaa6e01265c38f14a55481151bd94f5080d456a505e699e4e0e31619cef2485c1adeaaaa1a982cc76efce7abc247eb3984e0a9227ef9653f5bf4660cdbfe8873734e4223f60b849e162d9e3598ca767ecfc9fb1bd090e7e2f9d807e1b534667937ca85cc9bec450bcbf3842d09c118db102b8d8327141412889743c473e64ccee39918713fd954a7a3502b328f777d94bbcbf0af246beb1233efd83945c403ca308368f1d2e74762afa277f8178feff2f41327cfec3c6002e10ac9db204a934820a9b2c94dc2a9400f23086284029af11cee3bc3be82ed900e11af81d7dd2693654e05ce07bd1c5bcf8dd5b6e41cb31f1d75796a1f71ed0a9f1040f07c23811910de839f58bdf1d47b6ece15ed5ec8585b5fc427d1f386d3b6dac4e77deb75a4182d20f35c8c7ad993edec4d870b9bb5de4f47b7b347ee6adc3f036fc31009398da8289c1b82fb4f0787dba1e16d35b073100046ee0f1f6b4ab9d339607dfa6c6e9f2d1e3a182bdf4ddaf6932da57ab3b17bb75b4bd495a748115eaebe3c825c3599ca9820dff53486b187f32ec98d7c0160f2bcc3588ffccebb865bd8512123fafb57b0ebb259601268108add46443ce6e4822cb5cce59f45818521cb4b7a8d592725e90ee118705bfbf106b1569d37a66bb9966edceb4ade71a78cd5de8ddc8177f36eb63178ea973245ff67c6c4589d2e4d80e4a3025d5ee3c5183a514e81cf218119410e64b9ef3a91fd2ba1cc3bdd3da5196de465d5be9d00c3fab3304535514cc1d2d88c68ec803f864607fd6b0f088668b4cec6094eb09ad34f8b3700c2011aa78e07a02fe8bed2d47526fc1e8b7dd5110fcf993e474d7c2f9db07bef575322660a7d24c5bfcbcfee12afcd7b40c4453305d4fc0bc264f4c586760194925c26d2f4789c04a430bd20f6aa76063ddfbb4991861f5129edbd62f2b63c01ca4483e8c847f7a62a6df01e254fd0f0ecf5162841d29552381a4ac6bf43bf7c076cb01e19fad7b093c9af8fe3e4278bb9e7aa4cfe22f4a0079fbf64edfd2481d0bfddf86fc2838f9a0aa33603537248a7712618daa144abda706b8bc46b90f5dc052020672c05b200d6dbdda72a444294f6f06e55a11146c3b915b248beeaece49007f2dc172475f8c7ff85c594a44c3471140a44bf689a799b0116636c9b62ba15d68e26d02a969623667eef03ab55763b6b39187c11403f28ae4ff8f73f0dfc0f1c2dce00a414ad16636a8d6609d64e1b7bf4599150da9f83b24dd98753e6a861b7a1bf80ae8ff8afb17bd0212be0e4d913d919e3e27943a7a08131ffe304af657bd7cc8dd526d8048e9fcf2766af11cb8b72f8e8b3415ffda6509c20bb3e8f191451416cb2e22c2fad776b39f671f7bec7fcf3aea220c2f2786ecc65415d24847fca2cf3567b518f92ee2d7b7926e1c27ca050ffbf524a20657b8825766d43ff2212cb33015714ebfb48d108a877d95f31d5ed4dcc4b3486f8a72921b79e69b9dffe506e126d41b4c0c608e6f590579d2675cfc76103e6a053d563527126c428dfcb3bbcaa00ccbf9b69dc28c538910795bb31292e88795c3ca1d03e847a76f755ad487d35017ad126d9f0c4321c4ba1298a1234d562b1add95d1dbdac3f279bdd4ecce6f93c5adf0af955d6f363ee2eca6c708689fc40938301070822eee1fe81a2e0ba12cb37157c15a72e1e6f8284778aa665cb1d7355332c4f4b17bd03343196f01cad720c2febb900699bfc02d54d1a263d78754621f434ed6dce88cd1d91bc7490b2465180126e18436c7e3ce0cd11504b447f680ff185a46a7c446a65ab45e847a5eabf3b3f8bca591562635a2863e560853a715eb1ba8c9085afe38a7e4bd0c5fd5f15e416db8c50ac71861406de20440e1a0c0119adc42c68c650349696385257fb0d89d75728d69b1998eb41ba6d80688571384b60d46d1da23eb128fde737db2e5f5439e3cc158119716765ab4f5ac3f9bb8f836f98dab117ac529305a137a9ce2ab1339ef2c20ae0b03ca5210e358073d85cf56d65f039ad78c5bcf03c9a1c2020a7117304b25d982a4d37991ff2fa52f4e665740de73b1a7e9eb2468b4a797833d7bfc192592166d87f288b2741f64df6bf7cc5405350435dba770c9ad4cd7124f89dc555194db262e1f7aa9f5709f5eef201446efc481be4b8b7999e26711d84f7aec1ad0b198e10f6d8a32d9b8905e8668cdcab8697a57c77ab69d09743b2691fd61cf483027c6eab8671f973e6c0518d52e241cdadd1f506de32d177bf60a99fef47293e524988ccd5e795f8a5a11c7305607c9f44de19bafe0ced6fd77c706c801c687ce4f7017087154ab38310b557fc630583b4ebd35165b61961c705ae7b568b558d6b08b5d3c762cd023a906e7d8696f164e8cf099008e1ddb8354d3274c5d1962b29cab50d80ee196b23957c5c49e2b2892dd3907ffa801754f374241bbf5639400386bca728c47a60ad2b260c34dd7e3f984901b6cdf571207e512c00b8d19b34b63e722727e79324d00d04a8f9a4cd78082fb1e384d865b123410b6a08a8728c6bcaa05c435eff6943e572b724fe0cc4c91dc3428cc8bfdb0d9534d31f8c4546829a7ac991d1a6490c8ad35e53c489c30ccf9aff67fb01abb9374064fc6a25ad4ceab1c2172f7e15f628709b2494b1a683bdaf3412bd2f3ae265dc5cfed0b99202a738411ee36d72a949db21270daded2cc8817fbb57db481398f4cb3388b3b2f43affd92f86fa287bd306c8291ab8bd53bc3d4c69ffb524fe481945d5af6d8c7d80bb4a4a7562453ea7857dd4993fb3cd677bde0b6826f59982eab64015f733a29e3af52b49dada4eae04a78a5830ea57b0d94fadcafb242fd7dc59ab279f891f4986a7d7db2af29456ad226e1ec2d4e22e032f176381af44f0b5161bfd572b10327ce97da3ca5f04182871df158fada7ea6852a2cea878e176bd3278b7582e2ba29cecceb409b6290455b19960df968adf55f1d62ca674ba31827023a9ddd7756eb192aa06520ba1a72a41a86b676dc831a2685cb555f0337a201f5dd2a0cb3593b387d73f58b840cacb6838a95650377e1fe4aaef7bb1241368b13e1c90af6a9a7307f1b4cbc108652647ad74566183e940de0c00fdba882473f60f52590a07dc881233fef85bc61bbb1ea5524fb16a963bb95637e439c2ae14069a3d1623aacfd703f3551ca9064edae6194599ab1e75efa0ab44aba2dffd2a5a33e0e59cf30d84a1b27bcd36b49d5563f09c8b875929d98e89b4946040c7cb72f30449eb9f983c841e31cea445c14dfef8cd8684ffa0b2776994f8bed42833e8c718559334639191161d2e56a30883f10ff7f6f0772d5869e140d5870756050d83349596d4fd067cd869517682bfd97b15f121e6072751366a0fb8764dad1232ea1bf7d238688de5c75b1f99d6a532441d6a9769e9f8d64050971b664e759eebf47ef0d8ebb147b1b55138873bf871bb76c8df9c7f0599db02f36084f949ca22b2d321a34c35ac580d8b16f4e3f9c0988bc1f9dcc7b7109acf6339dac0a278baef5fe45158a3d85a9dc4aa8d829dd03b13472b42eb2b4e925acf9d3041fb1a0d6fcdf78de61e4f1f27a66c2676e6c55375eb9e39583059eda168a0cc7fcee32b135d29090814732304ebfad207c5459f0c33b817521b7647ed442668272f788d14f00129223996ddc1446e466dd8d0be40f803ad440eb33f5c12425d2d80612e19af81163afed42f440c3269deb478732c450977c5d82c1ee05a19966737d6f5796c1d31188310cfd9346fbd8e751ef1477ac99fbca0bb30b46fd3011093d7abfb7698c20b85e5a4f4594e446ba326374bd4147ab740a21edd5cc5f2b9be699564549f550b319744e155ff022c238a738d1941ead5ee9e080d637b496e03181d6a2c8c2e707b3ee8da281b79a58b0bb06345af1ccf778782491875cfa1eb4f0e58a4f796dc5f3340472690a5956842c782c62f7b7726fc5b1f2460f54be9ddd4a6cef5a616e1428deb99c366e73bed897d620e94a043cdca5be824bc801cccdfdc225763e62a1e6a9d09ee2db7021692d2ad9c209e12da42216ce64d439732039e2594f6bbc8af66ba2948f6fb83e351cba437da3f138c5de3d96d7230a9276c787631a910025c4a4faffe5f58b536cfc300f01cd2cafb7963d1f343e5c25de5099d0efd034e32d14de2c677099385e7a2f16710ef64efc7e5c9e1559a70b1aa6ce06ae977bebd7b872fd348b292397e87853aa67c5d6701549acc4daf3f55758e85eb795363d465642dfd52eea14736870195752747bc8f80f58f69ee4377002f531d9acd17283dd3819fb0c712a6c5d63741779b763a3633a8ab89ee5f8af49ba4697bb0247e0ae7361944ee0b8168959faabd5d277c12f0257384095ff5dce862b36737789d6a8e0676a75a5057e0270864438e35bd79393a392f28", &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="3b823eed3101e88e935d3408eba8ee3d5fed2615b550cf5bf5c8c4dfaef6aef4ad3feeb2379048deab75387548339f308d84c4874a4a8f7617268ed0424bbfc429135668a8bdbed218601bb5809edd0d4a530cb68d8ee38f40f4f86ac29e962407a10ec49334d41733bf0a12e4ddf0765830c1a4dd9dd5a1c53a7f8888b3eaa4b7522a8d2c4036c3575ac2ce309cf05725a81a0e9389d5382e0de5c64c42ac20c3a1fb0cecb0e9ce3afa0d157bc2d443ced5db703506999974596e31a80b1a768d4ca833bb1c8b33aad7") rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) rt_sigpending(&(0x7f0000000280), 0x8) r3 = socket(0x10, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') close(r3) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f00000005c0)={0x2d3a, 0x6, 0x1}) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r5, &(0x7f0000000d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r5, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) sendfile(r3, r4, &(0x7f0000000040), 0x80000002) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fcntl$setlease(r0, 0x400, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r4, 0x40106614, &(0x7f00000002c0)={0x0, @speck128}) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000540)={0x8001, 0x1, 0x2, 0x5, 0x80000000}, 0xc) ftruncate(r0, 0xfffffffffffffffb) 22:45:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) r8 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendto$inet6(r8, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:20 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x1, 0x20000000de}) ioctl$int_out(r1, 0x2, &(0x7f0000000080)) inotify_init1(0x0) r2 = getpgid(0x0) syz_open_procfs$namespace(r2, &(0x7f0000000000)='ns/cgroup\x00') ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:20 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) bind$netlink(r0, &(0x7f0000000180)={0x10, 0x0, 0x25dfdbfd, 0x2000000}, 0xc) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={r1, 0x10, &(0x7f0000000280)={&(0x7f0000000400)=""/149, 0x95, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r1, 0x10, &(0x7f0000000640)={&(0x7f00000001c0)=""/118, 0x76, r5}}, 0x10) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/loop-control\x00', 0x103, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:20 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x400000, 0x0) r1 = fcntl$getown(r0, 0x9) waitid(0x1, r1, &(0x7f0000000180), 0x4000000e, &(0x7f00000001c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) getpeername$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) r2 = getpid() ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000380)=0x7fff) clone(0x0, &(0x7f0000001180)="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", &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="3b823eed3101e88e935d3408eba8ee3d5fed2615b550cf5bf5c8c4dfaef6aef4ad3feeb2379048deab75387548339f308d84c4874a4a8f7617268ed0424bbfc429135668a8bdbed218601bb5809edd0d4a530cb68d8ee38f40f4f86ac29e962407a10ec49334d41733bf0a12e4ddf0765830c1a4dd9dd5a1c53a7f8888b3eaa4b7522a8d2c4036c3575ac2ce309cf05725a81a0e9389d5382e0de5c64c42ac20c3a1fb0cecb0e9ce3afa0d157bc2d443ced5db703506999974596e31a80b1a768d4ca833bb1c8b33aad7") rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) rt_sigpending(&(0x7f0000000280), 0x8) r3 = socket(0x10, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') close(r3) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f00000005c0)={0x2d3a, 0x6, 0x1}) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r5, &(0x7f0000000d00)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r5, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) sendfile(r3, r4, &(0x7f0000000040), 0x80000002) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fcntl$setlease(r0, 0x400, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r4, 0x40106614, &(0x7f00000002c0)={0x0, @speck128}) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000540)={0x8001, 0x1, 0x2, 0x5, 0x80000000}, 0xc) ftruncate(r0, 0xfffffffffffffffb) 22:45:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) signalfd(r0, &(0x7f0000000180)={0x3}, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f00000001c0)=0x7) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:20 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) [ 687.342227] input: syz1 as /devices/virtual/input/input80 22:45:20 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x200c0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0x78, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x316, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffffe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x4000800) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1, 0x32, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000ffc), 0x0, 0x0, &(0x7f0000001880)={0x0, 0x989680}, &(0x7f0000001840), 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) fremovexattr(r0, &(0x7f0000000000)=@known='system.sockprotoname\x00') 22:45:20 executing program 0: r0 = socket(0xa, 0x2, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="7f454c460002010900000000600900000000060000000000000000003800000000000000000000000000200000000000000001000000000000000000000000000000000000000000060000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aeef341330b305ead3d17aca24d46abebfe7a33f2c469498ecbd356ce126eba8af2f91541d0aa90f350fb658805a1702ef619df957e2a23fb491ba6ab46e298e3db0ed2a98f562f52b8f4dc9758c5c871540ac3f324c9a08fcce6822b59d2a397036e8c59639b7ddf8a9ac4a"], 0x258) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) getpid() ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) sendmsg$key(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="021701060300000027bd7000000000000000000000000096"], 0x18}}, 0x4000) setitimer(0x0, &(0x7f00000001c0)={{r2, r3/1000+10000}, {r4, r5/1000+10000}}, 0x0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000000)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x15, &(0x7f0000000080)='syzkaller1\x00', 0x10) 22:45:20 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) keyctl$read(0xb, r1, &(0x7f0000000000)=""/56, 0x38) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0xff99) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x0) 22:45:20 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x3, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) connect$netlink(r1, &(0x7f0000000100)=@kern={0x10, 0x0, 0x0, 0x2001180a}, 0xc) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:20 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCCBRK(r0, 0x5428) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) [ 687.575594] device lo left promiscuous mode [ 687.695214] device lo entered promiscuous mode 22:45:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) r8 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendto$inet6(r8, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:21 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000001c0)={'HL\x00'}, &(0x7f0000000200)=0x1e) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:21 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) setuid(0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x6dd) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:21 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r2 = inotify_init1(0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000180)={'bridge0\x00', 0xfff}) fcntl$getownex(r2, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:21 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x2801, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(r3, 0x8941, &(0x7f0000000140)=@generic={0x3, 0x4bc7b0e2, 0x2}) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) ioctl$TIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_elf64(r6, &(0x7f00000004c0)=ANY=[], 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0x1, 0x0, {0x7f}}, 0x18) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0x12) ioctl$FS_IOC_RESVSP(r6, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/keycreate\x00', 0x2, 0x0) write$selinux_context(r3, &(0x7f0000000300)='system_u:object_r:dri_device_t:s0\x00', 0x22) write$P9_RGETLOCK(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="11202f73656c696e75782f636f6e7465787400"], 0x13) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 22:45:21 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000140)="887d55e97af5b09d7a09447672c82a6f47de113e54db5ac3694c0a69b332fcf3a9913774fea9e5c6b2b8b0e382d2c25258b5b666bb54050fb4f87c879a78ae8062003f9cef72e64ea9cffbe094810f31a418955c4547ccb6c83f61dafae5309e718ed7dfd1fef9c10749a00b3a8f9e7488706b6fbf5d369c513c17ae6d2716575724a386") ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:21 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000300)) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x3) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$VT_DISALLOCATE(r3, 0x5608) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='/dev/zero\x00', r0}, 0x10) setsockopt$inet_mreq(r1, 0x0, 0x27, &(0x7f0000000200), 0x8) getsockopt(r4, 0x0, 0x8, &(0x7f0000000840)=""/210, &(0x7f0000000480)=0xd2) getsockopt(r0, 0x22, 0x9, &(0x7f0000000500)=""/2, &(0x7f0000000640)=0x2) 22:45:21 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x2000, 0x120) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x20, 0x12, 0xc, 0x8, "c6a894865d85ad3a4790f6676a032703e0a97b73a6232813ca241f26a9e3b9481965b3cc8261c8b8a8a50165ac8c17957b0f21ac592f3147bf17e0ee40a4c793", "3c716a929b4f92b7fb5ae17ac8afb2bf5c7f5a2fcf1e6442919e5b2b15ff9b4b", [0x1, 0x3b]}) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:21 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = dup2(r0, r0) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f0000000080)=""/106) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') fstat(r2, &(0x7f0000000140)) getresuid(&(0x7f0000000000), &(0x7f00000001c0), &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) setuid(r4) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x9204}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x2c, r5, 0x101, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10000}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) inotify_init1(0x0) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x0) 22:45:21 executing program 4: gettid() r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x88200) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x4}, 0x68) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) recvmmsg(0xffffffffffffffff, &(0x7f0000009000)=[{{&(0x7f0000004040)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000004200)=[{&(0x7f00000040c0)=""/112, 0x70}], 0x1, &(0x7f0000004240)=""/184, 0xb8}}], 0x1, 0x0, &(0x7f0000005ec0)={0x77359400}) write$P9_RSETATTR(r1, &(0x7f0000000000)={0x86}, 0x7) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r3, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r6 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) execveat(r3, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r7 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$TIOCLINUX5(r7, 0x541c, &(0x7f0000000180)={0x5, 0x8001, 0x6, 0x4, 0xff}) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) 22:45:21 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fadvise64(r1, 0x0, 0x9, 0x5) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000280)={0xdd, 0x4, 0x6, 0xffffffff, 0x80000000, 0x3, 0xd5cf, 0x43, 0x9, 0xf6, 0x7, 0xffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$sock_inet_SIOCGARP(r4, 0x8954, &(0x7f00000001c0)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x17}}, {0x0, @random="c4a186f23eb9"}, 0x40, {0x2, 0x4e20, @remote}, 'bpq0\x00'}) [ 688.418566] device lo left promiscuous mode [ 688.423062] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 688.544316] blk_update_request: I/O error, dev loop0, sector 552 22:45:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) r8 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendto$inet6(r8, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:21 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='memory.swap.max\x00', 0x2, 0x0) 22:45:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)={0x10c, r2, 0x300, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7f}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xb7c1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9d}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbc8}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x100000000}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x32}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xc, 0x1}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x16}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6tnl0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4008000}, 0x8000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:21 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000000300)={&(0x7f00000001c0)=@sco={0x1f, {0x80000001, 0x200, 0x4, 0x0, 0x2, 0x3}}, 0x80, &(0x7f0000000280), 0x0, &(0x7f0000000840)=[{0x6c, 0x117, 0x3, "3faedd62aae9c7f872562998abb393f81f07db4a36565bce004fedb808bb0df8c164d60f8b67589dc6ff8b4a142de4e22bf4796ab6ae8f7f660cb73da8cccb76cd8c5812837b5419c54ab95f5989659bc67ec8e4a9bab1c0196c360228"}, {0x30, 0x102, 0x77, "c683968c633417b49c07b9c6c9a5aaf5c717fe0137bd2e899017278500ee749bc6078246"}, {0xd0, 0x13f, 0x86d8, "e0104be78a0baae2fe83986bedfd78f20da073b35d68358ec70218664e4108f14ba5a07d551685bdf05ab80796eccc427b2b6d723abdafef9bb78c7e252736c26690dd740f8712c62c2508f2eafae7605fe856efb525feec4b5a53ac3a1c0baf598c8117437e2f72c6624f5b32e65014b5a8a35af0c154dce0d6bfcd8889fce79fb17527dba3e561dd62142d5010eb755ef622f0b5267538d5142dcc2ee4177a074817298fdfdf8ff1d47a95d94143c007fab20ae6bc9919b39926934107b35770"}, {0x50, 0x105, 0xfffffffffffff377, "e06fb2d2322a0d778bd0b8c359d1a2f2fea7c4ae29adabda51d741266c2ffc54e683df30dc55e9a4ef3665293b396682ba5e5589b9488dbef50ac7cde216530fedea49"}], 0x1bc, 0x4000}, 0xc014) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:21 executing program 0: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000001c0)={'HL\x00'}, &(0x7f0000000200)=0x1e) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:21 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setsockopt$packet_int(r1, 0x107, 0x3, &(0x7f00000001c0)=0x101, 0x4) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) listxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)=""/162, 0xa2) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:22 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) futimesat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{r2, r3/1000+10000}}) 22:45:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0xf7fffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) inotify_init() ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=@random={'user.', "3ade2b00"}, &(0x7f00000008c0)=""/4096, 0x1000) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) r8 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendto$inet6(r8, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:22 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) munlockall() ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:22 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) prctl$intptr(0x2a, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='cdg\x00', 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000880)='rxrpc_s\x00', &(0x7f0000000440)={'\x00', 0x1}, &(0x7f0000000200)='veth1_to_bond\x00', 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) socketpair(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getpeername$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000040)="6c6f00966fd651b159a9c84a2c60d29800000020") setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rtc0\x00', 0x80, 0x0) 22:45:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400040, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000180)={0xfff, 0x9, 0x381, 0x81, 0xc0000000000000, 0x100000000, 0x8, 0x0, 0x1, 0x3f, 0x1f, 0x2}) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000001c0)={0x401, 0x3, 0x800, 0x1, 0x40, 0xb10}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) [ 689.295498] device lo entered promiscuous mode [ 689.498040] device lo left promiscuous mode 22:45:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:22 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8400, 0x0) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000080)={0x18, 0x1, 0x0, {0x18}}, 0x18) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x0) getdents(r3, &(0x7f0000000140)=""/231, 0xe7) 22:45:22 executing program 4: r0 = gettid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r2, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000002b40)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f0000002c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r3, &(0x7f0000000500)={&(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000008c0)="025fc05319baff80554e3212168f6d400bab9fbd2e06d8c004412e0341f1f303d92c5afee92aac97e8e017fa3f47451ac1d4a6184ff936bc9033a46a1d8cd23ab93ddea5d00ab7d7fd50efc300f9381628bff6298afcecc4205244d4faec482d42ac86ee7fbe5f50344bbc038a85c7ae15d7fe538b95b6b5ae85eaf510faebc9f663886f6027545b03e3300c45bbfef5d35b51350b4cb5f21658b865a7dc91e97fe07617133713da2b810b8df44406157eebe2dce15a411ae1d10fd9794754cd9111f54bb9321c2676eda10b72ae", 0xce}, {&(0x7f00000009c0)="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", 0x1000}, {&(0x7f0000000400)="a2bbc320a0598f35523836b1d3a7db9e7d38b90a13ff3203c095efa6ce6ebe3383240d431f60ee83739af5658763e565d2c7764bc22b317898b2c1aaf4292783037f367fb047cc7efd260a42000ee9913d161118", 0x54}, {&(0x7f00000019c0)="d51381c13ae4b94c27bb84497401ea8a89c47c5ffe784ac2381f3c7ae5e6042ca0a53ed7f93f90604411a7291acc103404b311d50aa8ca6ee697ad94ed50ae2229c9a743fdf6e6dee070b43e44b24c99d5018c20f1b145b044839e3cd21b059186e4bc98d5debdc9f27d1332de9654b3ae839843c82203fa65018c857006715c94f562b36135d1e840ba72b615e2eb316e2224c7844536d298bd50a82ecb73aa84f432bd6f33c43c9dd6688ceec94290f89463545b4099ea3fa90d268351", 0xbe}, {&(0x7f0000000780)="9e1bfbca164c442a802dc8b19adc389f6a2ac8ff82e5894b1db982eec5d9529c7941f55017ff21502477704c999a49c6747a231709b9372158753d8740c6b4a817c404ad369ad62e7479f045d0ffb5988cd2d088b71fe2deaf1e8cd0da9cf5810b", 0x61}, {&(0x7f0000001a80)="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", 0x1000}, {&(0x7f0000002a80)="66c232f51858d12ab2311de9a3dfc731df47250e76886c2d7f53c8e66acef55bc9ddeabd6449e15c4fa0c40ca1c3973445ad20419d5714f0ddd86f97fed203cba49d66fcde85d0319113fc51e24ad52fe521d22239231c7c8b686724e64262d14cde8afbebf423f3a1d1f27b6038578ae22afd209cf24da1f89631e9f5eabedd09abae9fc1273e3e5a", 0x89}], 0x7, &(0x7f0000002cc0)=[@rights={0x14, 0x1, 0x1, [r4, r1]}, @rights={0x10, 0x1, 0x1, [r4]}, @rights={0x24, 0x1, 0x1, [r3, r2, r1, r2, r2, r4]}, @cred={0x18, 0x1, 0x2, r0, r5, r6}, @rights={0x34, 0x1, 0x1, [r3, r4, r1, r1, r2, r4, r1, r2, r1, r2]}, @rights={0x14, 0x1, 0x1, [r4, r4]}, @rights={0x10, 0x1, 0x1, [r1]}], 0xb8, 0x10}, 0x8000) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) execveat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r7 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r8 = inotify_init1(0x0) fcntl$getownex(r8, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r7, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:22 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) fsetxattr$trusted_overlay_opaque(r0, &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) 22:45:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000003c0)="7787147ebf0bd45a0686dee0898c972d737c7fdc747c671cf5697f4dc78fcd6019ed8bd5f8907b35574b6b40556d2727c1ee41b2b4c5c85ec44ff0eca3ef893e8bba825690c9c6f545820033ff78656ad5975112040a3124b4e8573cae3a1587c7e4a161c8965cef997cf8965533e37d718ed136235b2d7de8500909bd0e8f99b08ab4c7973357c0fd3f0cf1f3ab261e7857a39da7c58e27f86180abe7655df3cceb7fda6b7ab1d16c5adc02fb0ddbb2826c7a0cd043fa5de3419157c13c84acfdec401605de232d3b968f83d67e622bc1f31de53f7c2fb3350d02959fc45e2b6a2987f5ca94f74cab4a80", 0xeb, r1) 22:45:22 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FS_IOC_GETVERSION(r2, 0x80047601, &(0x7f0000000000)) 22:45:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000180)={0xc, @dev={0xac, 0x14, 0x14, 0xa}, 0x4e21, 0x3, 'wlc\x00', 0x24, 0x1, 0x75}, 0x2c) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setsockopt$sock_int(r2, 0x1, 0x2d, &(0x7f00000001c0)=0x2, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:22 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x37) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) [ 690.054250] device lo left promiscuous mode 22:45:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000003c0)="7787147ebf0bd45a0686dee0898c972d737c7fdc747c671cf5697f4dc78fcd6019ed8bd5f8907b35574b6b40556d2727c1ee41b2b4c5c85ec44ff0eca3ef893e8bba825690c9c6f545820033ff78656ad5975112040a3124b4e8573cae3a1587c7e4a161c8965cef997cf8965533e37d718ed136235b2d7de8500909bd0e8f99b08ab4c7973357c0fd3f0cf1f3ab261e7857a39da7c58e27f86180abe7655df3cceb7fda6b7ab1d16c5adc02fb0ddbb2826c7a0cd043fa5de3419157c13c84acfdec401605de232d3b968f83d67e622bc1f31de53f7c2fb3350d02959fc45e2b6a2987f5ca94f74cab4a80", 0xeb, r1) 22:45:23 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x900, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) [ 690.136243] device lo entered promiscuous mode 22:45:23 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000080)=0xc) setuid(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c, 0x80800) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000140)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000100002000000000000000000000000000000600000000000000000000000000000000000000000000000"], 0x48) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) fsetxattr(r0, &(0x7f00000001c0)=@random={'btrfs.', 'syzkaller\x00'}, &(0x7f0000000200)='raw\x00', 0x4, 0x1) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_open_pts(0xffffffffffffff9c, 0x84000) ioctl$TIOCLINUX3(r2, 0x541c, &(0x7f0000000280)) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) [ 690.342961] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! 22:45:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:23 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8400, 0x0) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000080)={0x18, 0x1, 0x0, {0x18}}, 0x18) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x0) getdents(r3, &(0x7f0000000140)=""/231, 0xe7) 22:45:23 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x9, @ipv4={[], [], @loopback}, 0x4}, 0x1c) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:23 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000040)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = dup2(r1, r0) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f0000000180)=0x5, 0x4) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:23 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='loginuid\x00') setuid(0x0) writev(r0, &(0x7f0000000580)=[{&(0x7f0000000200)="8cfe9398f25d15f74c0dbfeaa3546ec79bd596ef3b0b06cce22a7609e42275a4ad590c480f43db79e9be51f141d1ddcb2846afa8d6c1431279a5ce06c7ecc13f586361456de14c09052d0a1f0c2095ae8272afcd896cb20f61f1f60f8d96080b8656d29adffa6016c9aa6ab5ef3006500e17c2d8e04d41e922a1b80dca1e8a6a43460d01ac8d05d4e046f5ea36f1ff59", 0x90}, {&(0x7f00000003c0)="92bc714dfb3483ca08712dbbed4ad28ee75674f219faeee4d79a1eb0189967cc1f9a7780d389f3710f7767c578151544b9ab0fc4add042947b64e48416d28a107bf0ddb4a4f0ceda6725f19065a720da0d7d980b34d3d090d09d51341369ac9a1c2a2eb154ad1506c572af5778e7318dbdc548fdd808e4a2ac92b3640514234d976a013ae95ac766ef5347d1ac755bbc4b909c9358abbd2ed923c99d37daeba23a90a100c415ed25dcbb6c56d2630121c551253a93ed83d4fca0eb4f0407b0ced6ecf29533292009be752192e3d5ead77a92a98210a5c3b92089e6063c540eac4b05455f97ea6503c1", 0xe9}, {&(0x7f00000002c0)="d2f672761153c8569ed9172a50f4afb3847e7e493b1bb99f8a4ec8de16d5ffadbf50ed47d3720980e63c8caaa5bc77a45cc7682aefcfbfbe3b847041256b04dd1d0b766685e074697c740160495215f44346b5e6d7d94f519913e399b47cc3f31db6c33b473a4d9daffe8dd148c5dd9f11b877c8e1d8803aa2f407e444fc8cab244690d55a226321ffe04d60fcd7fc5a9e1039cdc70d80218161b4ff023b835ead2af23ea5c4866c060a80cefee4a1da0d32531403c3dfbba8bd54", 0xbb}, {&(0x7f00000004c0)="eb502d20977986f4c31d3416722dbf9bd3dac9ef6657d9a76bd5ec25a0fb97a6857bdc029a48c03401eae240e80bac12e3e82eb86cd913859976643b1ccc9e42fe8ab3966056bb8fe0be49563c5745937ad5e418a61b4cd296dbd043a81ef13db6ef0ce8dfc4b71d67c2a4b759e8ea366bae303200bbd1402519", 0x7a}, {&(0x7f0000000540)="9c383cc4822ab2990309e930d587e5ee2630557155eb34ce4f47d2215e8c1e2c0e2a68dc80378a53b79265de2331e009cdd0a5", 0x33}], 0x5) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000080)=0x2) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) ioctl$TIOCEXCL(r2, 0x540c) write$FUSE_GETXATTR(r2, &(0x7f00000005c0)={0x18, 0xfffffffffffffffe, 0x1, {0x7fffffff}}, 0x18) fremovexattr(r2, &(0x7f0000000000)=@random={'trusted.', '/dev/loop-control\x00'}) 22:45:23 executing program 1: gettid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) splice(r1, &(0x7f00000001c0), r0, &(0x7f0000000200), 0x80000001, 0xe) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:23 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) 22:45:23 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) keyctl$update(0x2, r2, &(0x7f0000000180)="d3cfb86faeeb320c1b34e838b1c6ccc44cc23d84fc4653f06a9ae109d158bb4bd3ce6b9e12a11e0282673063c694b3d35cf0f282be6009d948bae55bfe041d2ddadc02384b7984a4f6f7599534fe7398bf41e8ce49d4b4ff1414a048cb69822ed34f931357e61c5cce2ced8dd330fc0bd467ff74972f4d8d9c15f54e15166fe0178cf25685b129420f4eb595be92bbe02ce5179acec8d4e81e0a214b67a7e843874df5aaa29ea1c6c17137bfbfc626e089fa13648d9cb9e53b886f16d53ac126", 0xc0) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') seccomp(0x0, 0x1, &(0x7f0000000180)={0x8, &(0x7f0000000040)=[{0x9, 0x2000000000000000, 0x2, 0x1}, {0xffffffffffffffc1, 0xffffffffffffa2d8, 0x1f, 0x7fff}, {0x1000, 0xeb2, 0x3, 0x80000000}, {0x3, 0x100, 0x3ff, 0x5}, {0x8, 0x2, 0xe1, 0x5}, {0x4, 0x1ff, 0x7, 0x1}, {0x10000, 0x9, 0x10001, 0x100000000}, {0x1, 0x906f, 0x0, 0x10b}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:23 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$TUNGETFILTER(r1, 0x800854db, &(0x7f0000000840)=""/249) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40046602, &(0x7f0000000680)=0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000400)) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000440)='veth1\x00') getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) fchown(r1, r4, r5) r6 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') r7 = pkey_alloc(0x0, 0x3) pkey_free(r7) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f00000007c0)={0xfffffffffffffffc}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/mls\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000480)={'yam0\x00', 0x9002}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000780)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f00000006c0)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f0000000500)=[{0xe, 0x7}, {0x3, 0x20}, {0xb, 0x3f}, {0x2, 0xfffffffffffff916}, {0x8, 0x7cb}, {0xc, 0x81}], 0x6) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) [ 690.882198] device lo left promiscuous mode 22:45:23 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000040)='\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) write$P9_RLERRORu(r3, &(0x7f0000000180)={0x12, 0x7, 0x1, {{0x5, 'task\x00'}, 0x8e}}, 0x12) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$RNDZAPENTCNT(r3, 0x5204, &(0x7f00000001c0)=0x8) write(r0, &(0x7f00000003c0)="c252a12baa16a2beea90264e93f8a337d54e5158f51b391478441c676cd1c31cd1f2ed392cac72b952c1a9a075145c14993b235dd5208762b1b59840ab29551588dbfe38eb40f701773ec761aa2cf7d005522d0b029aa1fc00e02f5935b43d32f618f035135e15562f2f6366d1a7b61225a1511cfdb84f2d98c7d49a361f9f8fcb109b0e45e45a970dafb7baf01afbc5b4729007b353e6a2713b3d59ae79d91981fff303a446d3c00cc82f733e2b9e993c6dec3f8cd19e3a90839c69d0d7c8603081bacbafe27ccaa44a80a42c1424216d7faba886cc72f43a787ac7043f74b4e6e3b9c08a7fea06a7e1dd3e6b4941cffd92ba06b3", 0xf5) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) [ 691.004963] device lo entered promiscuous mode [ 691.058826] device lo entered promiscuous mode 22:45:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:24 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:24 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x10040, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x70, 0x2, 0x6, 0x6, 0x81, 0x0, 0x6, 0x48100, 0x1, 0x7aef, 0x1, 0x5, 0x2, 0x5, 0x2, 0x9, 0x9f, 0xb786, 0x400, 0x1000, 0xffffffffffff8001, 0x7, 0xce, 0x8000, 0xe041, 0x7fff, 0x3, 0xfff, 0x7, 0x1, 0x10001, 0x8000, 0x8, 0x4, 0x800, 0x9, 0x2, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000200), 0x2}, 0x8020, 0x1, 0xa08, 0x1, 0x0, 0x9, 0x3}, r0, 0x3, r1, 0xc) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r4) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) sendto$inet6(r5, &(0x7f0000000840)="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", 0xfe, 0x800, &(0x7f00000001c0)={0xa, 0x4e20, 0x6, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}, 0x1f}, 0x1c) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) flock(r2, 0xf) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:24 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) 22:45:24 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000180)={0x20, 0xed35, 0x2566, 0x1, 0x5}) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f0000000300)='IPVS\x00'], &(0x7f00000000c0)=[&(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00'], 0x800) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8), 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, &(0x7f0000d31ff0), &(0x7f00007adff0)={0x77359400}, 0x8) creat(&(0x7f00000001c0)='./file0\x00', 0x0) socket(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100), 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='sit0\x00', 0x10) sendto$inet(r2, &(0x7f0000000000), 0xffffffffffffffd1, 0x0, &(0x7f00000000c0), 0x10) shutdown(r2, 0x1) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='rxrpc_s\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e24, 0x1, @mcast2, 0x1}, 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:24 executing program 0: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) keyctl$update(0x2, r2, &(0x7f0000000180)="d3cfb86faeeb320c1b34e838b1c6ccc44cc23d84fc4653f06a9ae109d158bb4bd3ce6b9e12a11e0282673063c694b3d35cf0f282be6009d948bae55bfe041d2ddadc02384b7984a4f6f7599534fe7398bf41e8ce49d4b4ff1414a048cb69822ed34f931357e61c5cce2ced8dd330fc0bd467ff74972f4d8d9c15f54e15166fe0178cf25685b129420f4eb595be92bbe02ce5179acec8d4e81e0a214b67a7e843874df5aaa29ea1c6c17137bfbfc626e089fa13648d9cb9e53b886f16d53ac126", 0xc0) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:24 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:24 executing program 1: r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') fcntl$setlease(r1, 0x400, 0x1) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f00000001c0)=r0) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:24 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="469c00204b046972f9be1fa3d0523b6cb10574c902396e855ede6e52ba19dd91510e362dde14061da5d3fd4a84", @ANYRES16=r2, @ANYBLOB="01002cbd7000ffdbdf250500000044000100080005000100000008000500040000000800080001000000080006006f766600080008000000008008000b0073697000080006007365640008000b0073697000"], 0x58}, 0x1, 0x0, 0x0, 0x20040001}, 0x40000) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x4) 22:45:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:24 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0405405, &(0x7f0000000080)={{0x3, 0x2, 0x0, 0x0, 0x6cd}, 0x10001, 0x64743675, 0x2}) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) 22:45:24 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000100)) [ 692.050486] device lo left promiscuous mode [ 692.132204] device lo entered promiscuous mode 22:45:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:25 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:25 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r2 = memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000200)={0x15, 0x7, &(0x7f00000001c0)="5067123d1145e3"}) 22:45:25 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000080)={0x5, &(0x7f0000000000)=[{0x8, 0xae2d}, {0x5, 0x7ee}, {0xfffffffffffffeff, 0x3f}, {0x161, 0x1}, {0x7, 0xfffffffffffffa6f}]}) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') close(r0) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:25 executing program 3: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:25 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) ioctl(r0, 0x9, &(0x7f0000000140)="abeb594c4aa32d4f27439e9bf04a6c3b30c4f15bf280e9a32d9c796a0657154405ab0b03e174ddf5cdeb8f5e59fa1ee7783f82974a74817cad113845b1ee401a03ca35e99bc233b048aad9f0eff06d786e638b4adaad6d9631084f1ed0142f144b5ef93afd9af9561fd972e711b0bc7534c2450cd87f03a9a7324dafb9c35a36b71b25c916b5defa57cfe8690dc3b93958") syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') write$UHID_CREATE2(r2, &(0x7f00000003c0)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0x97, 0x90000000, 0x40, 0x6, 0xfffffffffffffffc, 0x4, "5de56abf63b44d1a8682164873c0e5ff952c3560d4fa6ee1e33fb51f5d039d77e6ba507625dac1d80c2036ed17137def0f5d6569267589d5bd903f6300258aa95eae4994717a6c8655be5720ed6d45409dae7995145e530a6a47fda262af4fa065136e749e49503a61d3a4bd0a2ecb793d84f4590cc9b1d7dfbe6235979c4a50f28a022398ea2feae6246fd38fcd5ce0ddba08426e0c0b"}, 0x1af) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) 22:45:25 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSKBLED(r1, 0x4b65, 0x4) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) 22:45:25 executing program 1: r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={r0, r3, r4}, 0xc) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:25 executing program 3: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:25 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="469c00204b046972f9be1fa3d0523b6cb10574c902396e855ede6e52ba19dd91510e362dde14061da5d3fd4a84", @ANYRES16=r2, @ANYBLOB="01002cbd7000ffdbdf250500000044000100080005000100000008000500040000000800080001000000080006006f766600080008000000008008000b0073697000080006007365640008000b0073697000"], 0x58}, 0x1, 0x0, 0x0, 0x20040001}, 0x40000) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x4) 22:45:25 executing program 4: gettid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80047601, &(0x7f0000000180)) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:25 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000840)=""/233, &(0x7f0000000480)=0xffffffffffffff88) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='vmnet1\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000001c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000400)='nr0\x00', &(0x7f0000000300)='(]keyring\x00'], 0x800) fcntl$setstatus(r1, 0x4, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) r3 = dup2(r0, r2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r3, r0, 0xc, 0xebae3843d5363b0}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) r8 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendto$inet6(r8, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:26 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2000, 0x1af) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000080)={0x7, 0x3f}) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000140)={{0x3f, @multicast2, 0x4e23, 0x0, 'sed\x00', 0xc93b802e8cc36078, 0x7ff, 0x6d}, {@remote, 0x4e21, 0x2000, 0x100, 0x0, 0xff}}, 0x44) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) 22:45:26 executing program 0: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) prctl$intptr(0x2a, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='cdg\x00', 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000880)='rxrpc_s\x00', &(0x7f0000000440)={'\x00', 0x1}, &(0x7f0000000200)='veth1_to_bond\x00', 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) socketpair(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getpeername$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000040)="6c6f00966fd651b159a9c84a2c60d29800000020") setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rtc0\x00', 0x80, 0x0) 22:45:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:26 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000001c0)=0x1, 0x38f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x2d2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:26 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x4b34, 0x2e5) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000180)='./file0\x00', 0x10000000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xdb}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:26 executing program 0: gettid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80047601, &(0x7f0000000180)) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) [ 693.325732] device lo entered promiscuous mode 22:45:26 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) getrlimit(0x7, &(0x7f0000000080)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0xfffffffffffff0e0, 0x8, 0x100, 0x0, 0x5, 0x7f, 0xe1, 0x1, 0x100000001}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:26 executing program 1: gettid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) write$binfmt_script(r0, &(0x7f0000000640)={'#! ', './file0', [{0x20, 'vboxnet1wlan0.'}, {}, {0x20, '(]keyring\x00'}, {0x20, '/dev/zero\x00'}, {0x20, 'IPVS\x00'}, {0x20, '['}, {}, {0x20, '(]keyring\x00'}], 0xa, "699292c41c063962dcca911605f97836255b468ab2be6128157468a18727f734418206158accca63570f025c1249ab0100558fba3273819ad4dbd9931133c6896b69d607a7c422b098f9fd8fa78346b2497d1178951293a2bb6a4ef98096342d11ff2b5fc37225f92bc8b49cff3c5c69716e0e14d6f1946d25e2"}, 0xbf) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') recvfrom(r0, &(0x7f00000001c0)=""/98, 0x62, 0x2000, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x4, @remote, 'syzkaller0\x00'}}, 0x80) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:26 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000200)={@remote, @broadcast, r2}, 0xc) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r5 = inotify_init1(0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000000)) open(&(0x7f0000000180)='./file0/../file0\x00', 0x101800, 0x40) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:26 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_bridge\x00', 0x4}, 0x18) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:26 executing program 1: gettid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) write$binfmt_script(r0, &(0x7f0000000640)={'#! ', './file0', [{0x20, 'vboxnet1wlan0.'}, {}, {0x20, '(]keyring\x00'}, {0x20, '/dev/zero\x00'}, {0x20, 'IPVS\x00'}, {0x20, '['}, {}, {0x20, '(]keyring\x00'}], 0xa, "699292c41c063962dcca911605f97836255b468ab2be6128157468a18727f734418206158accca63570f025c1249ab0100558fba3273819ad4dbd9931133c6896b69d607a7c422b098f9fd8fa78346b2497d1178951293a2bb6a4ef98096342d11ff2b5fc37225f92bc8b49cff3c5c69716e0e14d6f1946d25e2"}, 0xbf) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') recvfrom(r0, &(0x7f00000001c0)=""/98, 0x62, 0x2000, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x4, @remote, 'syzkaller0\x00'}}, 0x80) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) memfd_create(&(0x7f0000000180)='/dev/zero\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:26 executing program 3: pread64(0xffffffffffffffff, &(0x7f0000001200)=""/57, 0x39, 0x0) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/net\x00') read(r0, &(0x7f0000000080)=""/4096, 0x1000) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000001540)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001080)='/selinux/mls\x00', 0x0, 0x0) write$P9_RMKNOD(r3, &(0x7f00000010c0)={0x14, 0x13, 0x1, {0x10, 0x1, 0x1}}, 0x14) writev(r2, &(0x7f00000000c0), 0x20000000000002dd) 22:45:26 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) sendfile(r2, r0, &(0x7f0000000180)=0x40, 0x7) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'syz_tun\x00', {0x2, 0x4e22, @multicast1}}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$FIBMAP(r0, 0x1, &(0x7f0000000200)=0x1) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:26 executing program 0: r0 = gettid() ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001940)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e20, @local}, 0x200, 0x0, 0x3, 0x0, 0x0, &(0x7f0000001900)='team0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f0000000000), 0x8) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3e) pipe(&(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f0000000240)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000001840)}, 0x0) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2}], 0x1, 0xfffffffffffffff8) r3 = dup2(r1, r2) write$P9_RREAD(r3, &(0x7f0000000140)={0xb}, 0xb) fcntl$setown(r2, 0x8, r0) tkill(r0, 0x16) 22:45:26 executing program 5: pause() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) inotify_init1(0x800) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) getpgid(0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000000c0)="6664046e667f00") setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x2b) 22:45:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x31, &(0x7f0000000000)={@multicast2, @remote, @broadcast}, 0xc2) fcntl$dupfd(r0, 0x0, r0) 22:45:26 executing program 3: pread64(0xffffffffffffffff, &(0x7f0000001200)=""/57, 0x39, 0x0) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/net\x00') read(r0, &(0x7f0000000080)=""/4096, 0x1000) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000001540)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001080)='/selinux/mls\x00', 0x0, 0x0) write$P9_RMKNOD(r3, &(0x7f00000010c0)={0x14, 0x13, 0x1, {0x10, 0x1, 0x1}}, 0x14) writev(r2, &(0x7f00000000c0), 0x20000000000002dd) 22:45:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:27 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) writev(r1, &(0x7f0000000500)=[{&(0x7f00000008c0)="03341f0297dea7323d9582ccffe6a03a59f96cce7e3860d156eb3465add61163532da217559041edafcda655a242c38330fd326b923270b8873f9860a9e061aac346f53abfb5adca9b6d03f1e267bf3a28edff43eafd80e00d3642728d37c597bcd5593640af90842dcdc25618848518d41f36b64ec63e7e3518bd351a52d46f5f704402c499f5e4843d77e5bd8f232a3757a866f9459b35f9e2454acd76bc9cebc2a259129a9ae3659f96f8590eb8974d745d7696c7b33911f14103eba065e631045fa9a43dee1999bb", 0xca}, {&(0x7f0000000400)="94689767e5305486af5320e3e52a887b58dfdd876445e6b42b792820644828ef83c1fffebd1637891b406afb96388eb2ffca4fe2c697b13cfa768a1e1142423b3b16601d4d8316ef260278b2007232de2b2e3ab38473bcf23110a5843f574a5393d44d436c609c445db7c84c53a3363eb239841df783fb8a491aee9ab015a42d1e72b14db8df4988", 0x88}, {&(0x7f00000009c0)="f32a0c3f4c2dfc008ac9d1b831331c321b70a2fa0f43500665b498495cfb3add637fcadd4e5bb8da6dde5ec98a827548cdd5eecdde55672e328e13c6c857839c1bb0d21c6772bccbd68ad70b05d08279bc209cafa4c620f0d71e80eab93302d3f1e85a2a8aef2478c42b7a68cfb8fdc7d91931b7d522b45ca68fd20144f38d2d1de7b9b67ae382eb8bceca614f73ddcce3ffdf51b104ecbb6484a9b3940abde7c20ce9eee1133a070f", 0xa9}, {&(0x7f0000000a80)="f575181b3c1e6a4c0043ab1d86485b86eac0d59f387d6df09337d533bc89b52748c3a240bbf6f47e1b1111f4ddd3772dfd5c91aec6cca5e0f9ee05f5aa95baf46c9884133eb4038b9a7b8fe4cca86c50ef1c5356e9d222b209cde876e56dbb76282fab7f3f76f60c25ed6755faf7984ff19204731e4fd650d021a7a33408cbeed99de8e9ab09d46d1f11dfe9d89f4af0fbfb3bfd87663598ad40ff2a7428c9d37c75221e0a1fa1b58327ace5b9d5cec20886b090b0fe922ae66a5eddc63055c09a4ab72fa1b33f72", 0xc8}, {&(0x7f0000000280)="f897fae1c92e0d", 0x7}, {&(0x7f0000000b80)="974e4b09a99114cceb91979a3ad8116a94cc76469e0eb9433434c4a7eaa9d7ae294aacc86da1d77d06ddbc4e2eed2386580442fc9aab887b6c5d4e90a9ae2a0d7d2156ed6629dc21e5f100c4d9da6e5ba1bdf584fcce3d19ecdd3cd79be48626e67e70d7fbef985823ba2c597684b1130ef59464bbee04b3c0cd440fad0380aa7642b58a64ca72aa6359a94a66a772682b145dee1f2d05c36884aa9d2ba85e7fb2a8d53854271ada6db38b80023788b2759a29e4a46eea1094a4104c9166353c4e4013205895fce05b9ad53a16e9d6ad9d0a63b620f14de35372514cbd1f15", 0xdf}], 0x6) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000180)=""/84, 0x54}], 0x1, 0x0) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:27 executing program 3: r0 = socket$inet6(0x10, 0x8000000000000003, 0x4) readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/4096, 0x1000) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000013ff4)=@nl=@proc, 0x80, &(0x7f0000018ff0)=[{&(0x7f0000011e9a)="1000000014007fafb72d1cb2a4a28093", 0x10}], 0x1, &(0x7f0000004000)}, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) getgroups(0x1, &(0x7f0000000100)=[0xee00]) keyctl$chown(0x4, r1, r2, r3) 22:45:27 executing program 3: r0 = socket(0x10, 0x2, 0xc) socketpair(0xd, 0x3, 0xffffffffffffdb96, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000040)=""/84) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f00000012c0)="1f0000000104fffffd3b54c007110000f30501000b0004001a0000000000cf", 0x1f) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{0x6, 0x2}, {0xffffffff, 0x5c8}, {0x84, 0x200}]}) [ 694.260637] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. 22:45:27 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000400)="00bd", &(0x7f0000000440)='IPVS\x00', &(0x7f0000000180)="2f4465762f6c6f6f752d636f6e746c006c4ca3550407ce652da070d8c4a3e0b159ee1ed6f4c23db034e90269e4441a3f3a95296465f703cd896fe95e79f6fef196ef5002df0ce0838f3128126fb3f6d42c07", &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0), 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) fchdir(r1) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:27 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x3569) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) 22:45:27 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_DEV_CREATE(r1, 0x5501) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@generic={0x0, 0x4, 0x9}) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000040)) write(r1, &(0x7f00000001c0), 0xfffffef3) unshare(0x400) tee(r0, r0, 0x8, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xc, 0x100810, r0, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000080)) [ 694.302720] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. 22:45:27 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x802) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:watchdog_device_t:s0\x00', 0x27, 0x2) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x44, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="00634040000000000000000000000000000000000000000000000000000000000000000018000000000000000800000000000000", @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYBLOB='f*hw\x00\x00\x00\x00', @ANYRES64=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']], 0x0, 0x0, &(0x7f0000000340)}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RLOPEN(r2, &(0x7f00000000c0)={0x18, 0xd, 0x1, {{0x42, 0x3, 0x7}, 0x80000001}}, 0x18) 22:45:27 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') setxattr(&(0x7f0000000000)='\x00', &(0x7f0000000080)=@random={'user.', ',{lolo:eth1mime_type(\x00'}, &(0x7f00000000c0)='user^\x00', 0x6, 0x1) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:27 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) getgid() r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:27 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@rc={0x1f, {0x0, 0x7, 0x8, 0x778ff4b6, 0x1f, 0x4}, 0x86}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000000c0)}, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000001980)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x202201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'dummy0\x00', 0x24}) r1 = syz_open_procfs(0x0, &(0x7f0000000640)='ns\x00') ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000001ac0)={0x34, 0x0, &(0x7f0000001a80)}) getdents(r1, &(0x7f0000000040)=""/46, 0x25) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) sendmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000000940)="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", 0x800}], 0x1, &(0x7f0000001c40)=ANY=[], 0x0, 0x40}, 0x20000040) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000019c0)='tls\x00', 0x4) recvfrom$unix(r1, &(0x7f0000000100)=""/250, 0xfa, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000200)={@rand_addr, @broadcast, 0x0}, &(0x7f0000000240)=0xc) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000400)) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000001a40)) dup(r1) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={@mcast1, @mcast2, @dev={0xfe, 0x80, [], 0x15}, 0x200, 0x4, 0x80000000, 0x100, 0x7fffffff, 0x1000000, r3}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bind$inet(r1, &(0x7f0000001b40)={0x2, 0x4e20, @loopback}, 0x10) [ 694.836001] binder: 11759:11760 got transaction to context manager from process owning it [ 694.845607] binder: 11759:11760 transaction failed 29201/-22, size 24-8 line 3004 [ 694.869315] binder: BINDER_SET_CONTEXT_MGR already set [ 694.874925] binder: 11759:11764 ioctl 40046207 0 returned -16 22:45:27 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='mounts\x00') mkdir(&(0x7f0000000100)='./file0\x00', 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000280)=""/76, 0x4c}], 0x1, 0x4) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="7fa5d8f0e447c72ed8ba14205554c8e163bcfc473323355148fa72f5a515479c900d6a81878372acbc82044b8a6d1cfccc93f0f7e906835ff04c131183bc4ea282afdc5cb13902396ada99112ce97212f36065abf0d17e64a20cda9e82965f18971705c0107694d2c46e9e656296da4acf63dd82d9df0deb98bed217342478211905e36506fd0164d17fd51f21df825b2e4161bfed29b1c0a9a6a98d4502480267cc7e02"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f0000000280)) 22:45:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000002c0), &(0x7f0000000300)=0x0, &(0x7f0000000340)) setresgid(r1, r2, r3) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000040)={'dummy0\x00', {0x2, 0x4e21, @multicast1}}) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc0000000000030006000000000002000000e0000054d81458186fe8b90002000100000000007500000000000000030005001000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x82000, 0x0) 22:45:27 executing program 0: seccomp(0x1, 0x1, &(0x7f0000001980)={0x2, &(0x7f0000000000)=[{0x1d, 0x5, 0x2}, {0x3, 0x0, 0x80000000, 0xfffffffffffffffe}]}) syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') [ 694.881165] binder_alloc: 11759: binder_alloc_buf, no vma [ 694.881453] binder: undelivered TRANSACTION_ERROR: 29201 [ 694.895262] binder: 11759:11760 transaction failed 29189/-3, size 24-8 line 3136 [ 694.907119] binder: undelivered TRANSACTION_ERROR: 29189 22:45:27 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x10001, 0x800}]}, 0xc, 0x0) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x19) 22:45:27 executing program 1: unshare(0x24020400) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000300), &(0x7f0000000440)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="70657273a5871e162c6f6e616c69747900") readv(r0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/53, 0x35}], 0x1) read$FUSE(r0, &(0x7f00000004c0), 0x1000) open(&(0x7f0000000000)='./file0\x00', 0x401, 0x0) 22:45:27 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) fchdir(r0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x400000000000000c) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmmsg(r0, &(0x7f00000092c0), 0x4f, 0x0) fcntl$getflags(r0, 0x1) 22:45:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x64, &(0x7f0000000000), &(0x7f0000000300)=0x4) 22:45:28 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='tak\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r1, 0x0, 0x5, &(0x7f0000000000)='IPVS\x00', 0xffffffffffffffff}, 0x30) fcntl$lock(r0, 0x7, &(0x7f00000000c0)={0x0, 0x2, 0x4000000000000000, 0xff, r2}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f00008e5ff4)={0x10, 0x0, 0x0, 0x2302}, 0x7, &(0x7f0000000040)={&(0x7f000019bf9b)=ANY=[@ANYBLOB="750100002a08db82"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') r2 = socket(0xa, 0x80005, 0x3) r3 = fcntl$dupfd(r0, 0x0, r0) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x24000}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="20092abd7000fbdbdf25010000000c000800fd565464c3aa18ffffffffffff2400070008000100000000000000000000", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="1ee7450d8da29be6791860220fa496cf7e9b656cb75cd4b65ac4a22717adee14bc79c4214d180051ae7631080000000000000004000000000000001bfe97c57c87c7dcbb00000000000000000000000000", @ANYRES32=r4, @ANYBLOB="0c00050001000000000000000c000300935e0000000000000c0006000100000000000000"], 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x4044010) ioctl$sock_inet6_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000140)) 22:45:28 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x4000001, 0x19b1f7ac) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:28 executing program 0: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)="0000000000000000000000000200", 0xffffffffffffff9c}, 0x10) signalfd4(r0, &(0x7f0000000440)={0x8000}, 0x8, 0x80000) r1 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) io_setup(0x0, &(0x7f0000000100)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r4, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={r7, 0x8, 0x10}, 0x27a) sendfile(r2, r4, &(0x7f0000d83ff8)=0xfffffffffffffffd, 0x8000fffffffe) 22:45:28 executing program 3: getpid() mprotect(&(0x7f00004d9000/0x3000)=nil, 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x1c9c380}) 22:45:28 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000580)={'nat\x00', 0x7e, "fd1d6db1e8c4d7a785a4c85b406b8d58b4f421256a81357dc5446c82643593beaf9db2625fe3212f438376cf675e29be7deaefb8c5269a67eebaa3ae36baf9403220e1a469c28276839c27403cc1959a2d0accf707ea3a9705e539901ed7bdf5ed0abe7e90181c82d95c384d1d09dd32a3ccf18bfff0ee28e5b30c14b290"}, &(0x7f0000000640)=0xa2) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x5, 0x6, 0x5, 0x8, 0x183, 0x7}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) sched_getparam(r2, &(0x7f00000001c0)) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) getsockopt$inet_mreqsrc(r0, 0x0, 0x2d, &(0x7f00000000c0)={@local, @dev, @rand_addr}, &(0x7f0000000140)=0xc) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) ioctl$TIOCLINUX6(r3, 0x541c, &(0x7f0000000000)={0x6, 0x3ff}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x80800) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x1) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x0) [ 695.766102] device lo left promiscuous mode 22:45:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x100, 0x1c) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000240)={0x4, 0x8}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0xa, 0x1, 0x6) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x1, 0x0) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f0000000100)=r5) ioctl$TIOCSCTTY(r5, 0x540e, 0x2c71) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="400000001400090500000000000000000a000000", @ANYRES32=r3, @ANYBLOB="1400060000000040ffffffff000000000000000000000200fe8000000000000000000000000000aa"], 0x40}}, 0x0) [ 695.792929] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 695.817060] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=11850 comm=syz-executor1 22:45:28 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) socketpair(0x0, 0x5, 0x9, &(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_POLL(r1, &(0x7f0000000200)={0x18, 0x0, 0x3, {0x80000000}}, 0x18) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = accept4(0xffffffffffffffff, &(0x7f0000000080)=@generic, &(0x7f0000000000)=0x80, 0x80000) getsockopt$inet6_buf(r2, 0x29, 0x2b, &(0x7f0000000140)=""/40, &(0x7f0000000180)=0x28) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x0) [ 695.869179] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=11871 comm=syz-executor1 22:45:28 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:28 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1) write(r2, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) tee(r0, r2, 0x400ffffffff, 0x2) 22:45:29 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f00000000c0)={0x34}) [ 696.043005] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 696.052151] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. 22:45:29 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) socketpair(0x0, 0x5, 0x9, &(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_POLL(r1, &(0x7f0000000200)={0x18, 0x0, 0x3, {0x80000000}}, 0x18) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = accept4(0xffffffffffffffff, &(0x7f0000000080)=@generic, &(0x7f0000000000)=0x80, 0x80000) getsockopt$inet6_buf(r2, 0x29, 0x2b, &(0x7f0000000140)=""/40, &(0x7f0000000180)=0x28) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x0) 22:45:29 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') geteuid() getuid() lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in=@dev, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) geteuid() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0) setuid(r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x20000000) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:29 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0xf, 0x0, 0x9, 0x8, 0x20, 0x1, 0x1}, 0x2c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0)={0x0}, &(0x7f0000000700)=0xc) fcntl$setown(r0, 0x8, r1) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000000)={&(0x7f0000000200)=@nl, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007f7500fe01b2a4a280930a06000000a8430891120000390008000a000a0094bf63701900a30700f83a8aa00000dc1338d54400009b84136ef75afb83de448daa7227c43abc220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000000480)}, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x40, r4, 0x800, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfff}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x11}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="7001000016403bc0efc8", @ANYRES16=r4, @ANYBLOB="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"], 0x170}}, 0x8001) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000400)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x8, &(0x7f0000000440)={0x1}) getsockopt$inet6_opts(r2, 0x29, 0x0, &(0x7f0000000140)=""/97, &(0x7f0000000040)=0x61) 22:45:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14, 0x80800) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000240)=r2) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x8000000036, &(0x7f0000000180)=@dstopts, 0x8) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f00000001c0)=0x7fff, 0x4) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002ff0), 0x0, &(0x7f0000000180)}, 0x0) recvmmsg(r0, &(0x7f00000069c0)=[{{&(0x7f0000006240)=@ethernet, 0x80, &(0x7f0000006480), 0x0, &(0x7f00000064c0)=""/188, 0xfffffffffffffef9}}], 0x1, 0x0, &(0x7f0000006c40)) clock_getres(0x7, &(0x7f0000000040)) 22:45:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r6, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:29 executing program 4: gettid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r1, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40046607, &(0x7f0000000280)=0x100) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r5 = inotify_init1(0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000000)) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) fsetxattr$trusted_overlay_redirect(r2, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x2) 22:45:29 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x20200) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000002004e2200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000002004e20e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ac1414aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001e104407919a6c06a53d2add4af361c9532c445595ce77964f4c4479d923e404e650694c593157e17e2807c56dd0861e89476c7918f0c619e5866712da751017b4ec70fe0795cdcc625fba424a7f657674ee40ca3d2b18a8c684f4e69b268c5044077aff9dee11846c3b40dfe0ede96d92052a3a1f010cd83e424bd88a8edeb4af5a6f6dc4d0e7fbf0df995c894272217ae3b007b0cd04d62c61a059fea35921dffc44953b5f0bdad26d27f417b5d6d418c08fc62d44cb2526ced82a9950bf34036f925bf73d2df7b6467f51d89342e04b156a68cd16efb80685cea162e3"], 0x20c) write$binfmt_misc(r0, &(0x7f0000000040)={'syz1', "a8623d0126a34c54f17b6cea6fbc885f54d0770bad52"}, 0x1a) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f00000007c0)=""/4096) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000180)) 22:45:29 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x400) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$KDSIGACCEPT(r2, 0x5393, 0x80001000824ffd8) 22:45:29 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x2000000000c0d) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x800002, 0x11, r3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) fstat(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@loopback, @in=@remote, 0x4e21, 0x0, 0x4e22, 0xdc800000000, 0x2, 0xa0, 0x0, 0x76, r4, r5}, {0x4, 0x27, 0x0, 0x1f, 0x7fff, 0x800, 0x1ef, 0x3be}, {0x69c, 0x3, 0xffffffffffffffe0, 0xc9}, 0x6, 0x6e6bb8, 0x3, 0x1, 0x2, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x1b}, 0x4d2, 0xff}, 0x2, @in=@remote, 0x0, 0x2, 0x3, 0x800, 0xfff, 0x6, 0xffffffff00000001}}, 0xe8) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x4}, 0x68) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) lsetxattr$trusted_overlay_redirect(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./bus\x00', 0x6, 0x0) write$P9_ROPEN(r2, &(0x7f0000000080)={0x18, 0x71, 0x1, {{0x20, 0x4, 0x1}, 0x1f}}, 0x18) lseek(r3, 0x0, 0x3) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r6) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r7 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r7, 0x4b4e, 0x0) 22:45:29 executing program 0: clone(0x20002101, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) socketpair(0xa, 0x80007, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000000c0)={0x18}, 0x18) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x2ea) writev(r0, &(0x7f0000000080), 0x2000000000000191) 22:45:29 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000118ffc), 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000007affc), 0x4) getsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x8) ioctl$FICLONE(r1, 0x40049409, r1) 22:45:29 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20802, 0x0) accept4$unix(r1, 0x0, &(0x7f0000000080), 0x80000) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000000)=""/38) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0xe7, 0x0) 22:45:29 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000180)=0x2f3, 0x4) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 22:45:29 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) epoll_create(0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) preadv(r1, &(0x7f0000000400)=[{&(0x7f0000000500)=""/204, 0xcc}], 0x1, 0x0) syz_open_procfs$namespace(r2, &(0x7f00000000c0)='ns/net\x00') vmsplice(r1, &(0x7f0000000340)=[{&(0x7f00000013c0)="e7", 0x1}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') fadvise64(r3, 0x0, 0x7fff, 0x1) socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) 22:45:29 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="6311c344be73478f21eee8fd385dd48a54b75a47ff40a0cd92f05931eab0209b8b6d92f190d25d140e303548cc573b7aefade88255c4b9c82529dadb5335865e4a5fb71dee6034ba700b17f23309a46b9c2df5cb99e3c1c92517a8628bef5d169b63995399f8f1d1456ef309bfabb2904cc6dfbf1887e9211ddc0f69810b31c1faffaab62818024a0d491f42885ec92e262ba4b8b68ac8a0bfd5e58718c2916e037f6368f285d65cf97a1bac4aed7aed9976f660974d325b0cabd85ab82f02"], &(0x7f0000001400)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') [ 696.863865] device lo left promiscuous mode 22:45:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f00000000c0), 0xc, &(0x7f0000000040)={&(0x7f0000000080)=@ipv4_getnetconf={0x14, 0x52, 0x15}, 0x14}}, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000140)=0xc) [ 696.902888] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 697.002305] device lo entered promiscuous mode 22:45:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) sendto$inet6(r6, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:30 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000000c0)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) fchownat(r2, &(0x7f0000000000)='./file0\x00', r3, r4, 0x100) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) 22:45:30 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000180)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r0, &(0x7f00000008c0)={0xa0, 0x19, 0x1, {0xc28, {0x10, 0x2, 0x3}, 0x8, r4, r5, 0xfffffffffffffffc, 0x1, 0xffffffffffff7fff, 0xfffffffffffff000, 0x3, 0x7, 0xd4c9, 0x8, 0x32, 0x9, 0x6, 0x7fffffff, 0x0, 0x3cc7aaf2, 0x9}}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:30 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x2000000000c0d) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x800002, 0x11, r3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) fstat(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@loopback, @in=@remote, 0x4e21, 0x0, 0x4e22, 0xdc800000000, 0x2, 0xa0, 0x0, 0x76, r4, r5}, {0x4, 0x27, 0x0, 0x1f, 0x7fff, 0x800, 0x1ef, 0x3be}, {0x69c, 0x3, 0xffffffffffffffe0, 0xc9}, 0x6, 0x6e6bb8, 0x3, 0x1, 0x2, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x1b}, 0x4d2, 0xff}, 0x2, @in=@remote, 0x0, 0x2, 0x3, 0x800, 0xfff, 0x6, 0xffffffff00000001}}, 0xe8) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x4}, 0x68) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) lsetxattr$trusted_overlay_redirect(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./bus\x00', 0x6, 0x0) write$P9_ROPEN(r2, &(0x7f0000000080)={0x18, 0x71, 0x1, {{0x20, 0x4, 0x1}, 0x1f}}, 0x18) lseek(r3, 0x0, 0x3) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r6) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r7 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r7, 0x4b4e, 0x0) 22:45:30 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) io_setup(0x0, &(0x7f0000000080)=0x0) r1 = memfd_create(&(0x7f0000001200)='/dev/vga_arbiter\x00', 0x2) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000001240)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000001280)={r2}) r3 = timerfd_create(0x7, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x20200, 0x0) io_cancel(r0, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x9, r3, &(0x7f0000000180)="53e9f54c448250f5487547c1e1b9203c293c9430d7b5c6507c2fd6f249b228a29a91cc4c28ec54043ad47bb11abe7d6bb174b8e030c4825c75f117f99372b2dee6322a7bfafd0d832fec5a33ed48c34d9e48cd388d1f40ce7e0b3cd261648c4955c4ff19f075a58d0f42dc5dae707ec89995fa4248abb4ff9444ec4012025d80d5d78d1baa67a2e7df59bc98dc3b93f2ecd58f00ffd7e00b4dff87cc7a4136a06b20d4fbd2006bbaef83a546e5ada8d3dfa542e8140e9b8b6fc32b881587a7d994cdd5cadf2a8cd92ec1ad98ecc33952bc42607fcbc6a88589dc3f4117dbe514fff79f5d99a3a3d0a42b9b19fb06b3e0e012ceb2abc3640f6d3dad854dcfe77b7232dc6e962ef4d09de6a351721c1f8f4a0463011632fca650cd99d30ecb3e34da2c32711b574115c5dd3deb3f4f4285195eafb491367af69f214d93117796fcca7a6637550fb739b94aa772bd3580f82e3346e6f4bf395a9c303e09aa1f01cf20e9d9598d33cc77961ec695c4e8808ae11b4087e0cd31a27887f7f79d3c60168cd1b03064574f4bce12e051adf62c35214a8ee9b0f070d1a5d0dbd6bbbf6552dd93dfb1a3feb3c095b12282a4abe3f6add0c8305fe1e6f2fca2d7543ee73a815b720443320cd8e111804d6d7e63f6dce00cc6a065eb2f598aeaf96f3414b636e6df2630bac270dc0cb7158e34818dca21503d813ccc2c747232750ef65eacaccb7c3de5e7d0f67554587f8dc87a6c878aaea7b3b4a4342bdd31cb880c4fad141447b3d261909f2a1952d9db758723ef923b86113ffa145082b30ec2ce90baf0e5d7734f253070b0a696afc62628261fc024e8e8a72b0cb2a7af2e7c7995a8d4e2247f8a6945b482d0e4f120c2ca5c2b0bb419b00e538449a66d100f48ec8a1a1cae67697434d16b76f33811b51ba8128a45b2e1f5e6b4c53ce60b73c45fd413684cc589e7be749fbd0004c91f7f0c039aabcb6cd0e3cd32ccd18483e731f539baaceab9a5056ff534d80086c5bdafd31655b54cefe70c6c26fec05f70dbe3cbb36e27710808d30fb34783d6abc707a30c75df26079bcdbedc94848fcf6b21f8ebf54c1082a7861bf817785abc9f328b510e6452f4835b65387fe09415705301555f7887dd407d63ed8bc9b74b46a16a5674c67e98091629075994f1b65a9c23e7319920b4e3cbb97b1dcc0ac882709b03b38a1e138a3fdeee531cfc960da499519d937f179cfcaa984b00a0989824f2d9452596bd66ec055069b700eb00ff36573d25350850694927e4584f5f8a72a478cc62f99fee2a718dc4864a894b17728cf07d08f1ac206d0fe458c9a845580346af32ba48201911cffb0aaee8204e2ded740458a09d5a63509367486b67bcd654fa34cb87d7a7e77c2cd09dc225d33ca5c78519a43f32db7e06506e559c1105154157d76178d979df8f1d3f961019e436eb268224bb5b636ffe16293bb361cec9b325abf2689983bdd06bb742f6218dfe5552975fcc646de586ec5ef70b4c330e1c00de730d9a084ee7fbfecc027d87497da4814109e622e01ce7c8724325be7325b3d5ece1573decf12cc368742e3c17409971ef0aff94366de1e57703952f48f95048234cc7d9db63d40df046ad383a8c1787275c9105572a442d880ff09172de4f65301ca0ebfd35a627e01a7b577bec1c88290f9fd1073c8bac73b06ad89775d92534fd5fc71d3e60d15e50193a27c6399b00fda2e9f5c11bcc79454c5ae1062513ac24e700d061a2af35f581d884bc64a8ff58421edab53e85b96a385e8258a87a0058056fc18a7914ce2aaf7951dbcb3e95d5189679e4593cbea313b48f0258f666f2ed2734f482fe5b30ed1c7bb36dcbb0615ecd5cbd563174f2ca38e2b3a2427e6b388b6ba6e55c3adbd600a2368d08e6461c4e4fd1bda6c5d4a689fc29a3ac1c0ec7c3b665acb734943c10b4bf36367c73fc5055644be9629a007f4a7c938df54a7037131702f755ca04eb8ec1802e89a1afb565a51b1f5392b003ac010bb0903d85985eeb1bfb882532d8c30bff0448fbd61c09ca406fa950b57e0a050a301369ed8d25243922ba1749bc752bf4f0c130a8f7121ddff86a8343f2804d5cf601ec02f352adc207cd787ba397073c2d64156e0ee529b10239a799faa4e7b503962ac9d0e261ffc7d0d0ddc44e0061992720c615531a53225a262ef6288496135fafe6e8928493425d0cd00029945bf893c0553eba9b3cee6517074217af7ef4a25848dafa2c5b1956472f70ff67cd4682b046b691bc153bf94be1ec42f90def81bfbffcde6d1054b6dfb8dc7523abc868787137c1cd8fe76b966205c4d96b289e15f7ba20c11c8edf8327ffd59d13f2595ab855be0075fa02a2fe13078f9ff33c23a9fd9c60a4e822d01af98151824cb9776066b546b48e3fade3a6fd77e0ece5a039c20d368da8e3d88ccdbfa377fa3a12fd24fb0609b0254f4692b6c673183c890a845be62acf3f17bb7d7f98d4845393f25a1d97da4b16bd0aed82e76c6c4a04016b448b51911db5fe15e6c070de1335fcd10c6e0e72773ba9753a2825959786e8e353b4ebb273736055bc621f96110198dcaaae500c87a966b2074ea8071d7ac1269f5d4a71e4e7ef8bfe7b587e4de576239038b114848ea5b2c9a8e2ce9f871f07410ad0e366a9c432c80d38a3c5995639e037aacef7ca9348dfcd1912ba55a0a62b44cbea1858b2deb832a51c8afce3537876f29081aabb0ab278df925d92e523fca45cb0d5d9a3a0499497853a5872f9cf5a0769bcc859172224fd9f5a813a16cb62fde9227bbe976634ad5d5fe2f08e27581ff043e457d74a52316c44aa4a103bfdfe5f7a2a3ad55336f5fdb9ec3e6f2a77067e61ef1b687e8a4865c1d82b5046399362704896cdf881ecb56820200a3584fbfae1d233081af1f0834701c321f54690c88ac1f81fa02e19e7c5407dfb0032ad5535b666e1a31959218313f5ea8a6cb51d85024dfeba447c0c1d8b89a64f506084197ee19373b37eefa817b558848fff82e56153f4b22a4209ee659c7321942d2b09949fedb65e219752ac82e9bd737907dbc8cbbcdd3ac6add210935b42683231011f9ac98d36264874d2d7dd7fd38f49d8b01bbb7280be6142a34976df12df56fbb7c6e59957841945f9555067dfaebd4875a5cf3aceec6518ccb8fbe45a49687f85818271d15d4c73569c104f43e7ff746be32d745e448bc6fc000810b1f70001783d4264f32a312063e9dbd0ce5f294e7ce99cba01d602dc213fe196fbc7d20f54ee9344d96dd155a2e32e40c32dded26da0f2ac92eb2b954425be28fff6b617d053aee614465570d0c5d9e12b02ec6df134e579789dacb4756e128264b8cbdb8fefcfe527b1c6111ef7cd32a0e17d391793c754e3929225a5e9c2c7930277be8ed78d1dd7bfda8fd748f0270d47a09e6aea5b4fd6f53299eb882c970e8000b0417bd20b8541e328943632b98cda1618f0ab9944e5b5732deaf6671631e813d77e62e464544e5ee862ab8a81b0f546ffc0ea8ef3d2fb49b29b33368711aea688dcbd849c54e0a7bbb872e440b04562c1316339b517eee74956aa148742d468aa307596a553f0a11dac20fdac6d61cddaa51986d6fc78648a935db935d8381bf2a8930cc0b8a1318317380a4394e4ea4eceec54c8f237cdb346300a8760b470c32a44eb44deff30d5e05561bb265e71e152a6a7e4db110042af40f050e8aa64db885ab36fc2de5f85e0c6b54b15c72814715de850d2dc19e732292d522d9bc2506d20aeb94567da93e8c6df08585b8c38b6ae77bc36be851a0dd24923d5637c57054b8d74a9f878468ed512994d2b0602fd40361787915e6fb13a85821911f394f9841e4dc3d55e8be3437bf716b4cd752b73150ea65d3dc385d6cc1faedbfeda9eada0ed14694ef53584f1aa01188a6f53999abf6201b3b74f14b44c72e146815cfbf170db5f63ba21342ae8178bac19c5ece71664b433446622000f8cc35d84a18ab3de5b15bd5ee0e3c499e49681909777cddaad1db9fe3c131d658cfd6370cf505d26253eaa245057804d6e5f28dca658b8498969c52cd6e86613b2275fea1f940a9a0f0d32632c8b11bfb011f8e0c52414b446c4ba81c4c15db013e8d67d0305a1c2bda331bbca606af17f0c6d30f05fcc40a470fc1fb9a7efdeff0e735d8b64948c038c2f55e0e7b37526c1d06e8cebc5061255adeeb4a0587751190795f2cd265dc84ea27d667f6d2664964b0a27c1d902df55fa0374a50a0ef98d725c4cb990ecce80ed140b76feda664f7a69c5f9fd77e24602397d611cff2a01c9cceb26a42001462a47ed82cd412788f9372cf540d7254f8c4db0884a5cd02b632b7baa503c65c29d96eff0a4b104d2c21d6e2f7d85d9a4c85992166bd6478b1e5e4e1c1421bb55d972712053cdaaefbe95d3090574150c8800ce64dec222d70959513dfe0c3a2a86724dd395d37580020503a56b06127498c5c1e5c1e9f8cb04a173d1e5cc567847d2b9cf05f194fe37a46958cd94fa8a5778ecd5e7caa5efcf9875dca4ab3fd445dd741a62153c71f0c5033349709e03cedf96d0379c1f8a9d59c83f5b87e471db8eb469ec6e3e7a2d79f3db1df839e235d5a694d19bc126e7b82ad67a1e69bae9e2ca53ae636a86c5290ac475c6ab539bfbe65599d33de3a680b4536ea6705a8c910f90fb692b3004c70c213d2cb15fb5dc827305e7531a1cf3bb4b4303ac83da70912c8060109ea08e9e90b9f799a285236dbc10538c03ad61cb0f1c91ee2799fdde83c06cefd2fb71f7e9db76236f0c2986266cc5aef1701a90c579e1d478c6a935f84cf54dcef0ce46395462c16d6fed954de32297d204a38fb683c61cd0d278a9867ea67f795c9c1940ac93ea0f7683e5d63592eef86e06f5c67ff3d3a4aea7cf6c235629cecb76f12e252d1405011cc6da2e153d9c5b0f590dcd597ed167fa6aa78fe8ae186b627edcf4a14b9ff29f50111a005614f7317e959edb9c6b9e0035108550a82f56d818f7171f8e66d9a289b931ae72dde4518e9f517852dba97be29acabf950d51336b795981fc1e48413267074c8232c6f694327e067a54dd1c5bf099697d9e2544b5954d2359a6874f169c3a7aed83fbed482e7d877787b791996b9676a2076c735bc886fed8f160175efa82ea6eb89ee7989c09dcbc4db6faab5367944da8289d10d09c9f3161c6773280551d20b1f96c799675b9255e045fdd39ffe8f45aef72d30d3b5d6ae42a658f155cc6329dd8abb82d6267e8c381e7a438a3e081ad8d4210fb3b94ff5ba57d0cad2f452d32271db4ef3a60589a784ff05baea3953fa15eb5c514e0cd169728df2b9087b4b2b9de3463a94a199371ac6f5503aeff8db960894c299865f3e38ad51ddb2a4077c7ccb4bda257f3d4434dbdeccf6d1f62a2e784d80fef7c21ba3f4c1a36e94a32661972c6003df2d7acfdaa1ed545c7b0acbad2b22bb8e8af2983b02d8b5a8f6557501a30b3b7dd428851a2c5ffa400b3ac06b2bdf529db13829de7323fd35a498721c6ca6ff75965826fa75a63ae1b7280aa09d6c8bb3c7229396db03abbae6a9ce4e953d448230bd157a3b2e065bbc14098fd328d0f5cab82711bee8d8beba2bbba81ef9f2a8403e208e84f814b982d0fcf9494a485d7f5ed080d11fe52d1f2c71d088add0f0cc604da7658a37d141e016d560851fbcdc7870d9dd37d46759ae23014398b30b0a08f40ae5ed10f01104ed21fe0f7935a8f175682a4e7f1a76e94af27083ffc3c149bb2f7f87304f80ceeb8fad9eb", 0x1000, 0x9, 0x0, 0x3, r4}, &(0x7f00000011c0)) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)=0x7ff) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r6, 0x0, 0x1e, &(0x7f0000000140)={@remote, @multicast2}, 0x8) 22:45:30 executing program 3: r0 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x20000000406, 0xffffffffffffffff) write$P9_RVERSION(r1, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000040)={@remote}, 0x14) 22:45:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={'\x00', {0x2, 0x4e21, @multicast2}}) 22:45:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0xfffffd64) syz_emit_ethernet(0x1, &(0x7f0000001080)=ANY=[@ANYBLOB="aaaaaaaaaabbaaaaaaaaaa00813736df0b7c5f2e8a000000c2d51d26d57c000000000000e0d26d34ac6304f17030c27a79359d"], &(0x7f00000000c0)) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) 22:45:30 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080), &(0x7f00000000c0)=0x8) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in=@multicast2, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) r1 = socket$inet6(0xa, 0x802, 0x88) read(r0, &(0x7f0000000380)=""/4096, 0x1000) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc)=0x1, 0x4) r2 = memfd_create(&(0x7f00000001c0)='em1\x00', 0x1) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80585414, &(0x7f0000000140)=""/115) sendto$inet6(r1, &(0x7f0000000000)="96", 0x1, 0x0, &(0x7f0000000340)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x2) pread64(r1, &(0x7f0000001380)=""/4096, 0x1000, 0x0) 22:45:30 executing program 4: gettid() getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:30 executing program 1: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000180)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r0, &(0x7f00000008c0)={0xa0, 0x19, 0x1, {0xc28, {0x10, 0x2, 0x3}, 0x8, r4, r5, 0xfffffffffffffffc, 0x1, 0xffffffffffff7fff, 0xfffffffffffff000, 0x3, 0x7, 0xd4c9, 0x8, 0x32, 0x9, 0x6, 0x7fffffff, 0x0, 0x3cc7aaf2, 0x9}}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:30 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) uname(&(0x7f0000000080)=""/107) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) [ 697.631194] device lo left promiscuous mode [ 697.770082] device lo entered promiscuous mode 22:45:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000140)={[], 0x4, 0x2, 0x1000, 0x1, 0x4, r5}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) 22:45:31 executing program 3: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000180)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r0, &(0x7f00000008c0)={0xa0, 0x19, 0x1, {0xc28, {0x10, 0x2, 0x3}, 0x8, r4, r5, 0xfffffffffffffffc, 0x1, 0xffffffffffff7fff, 0xfffffffffffff000, 0x3, 0x7, 0xd4c9, 0x8, 0x32, 0x9, 0x6, 0x7fffffff, 0x0, 0x3cc7aaf2, 0x9}}, 0xa0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:31 executing program 0: r0 = gettid() r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)) unshare(0x400) fcntl$lock(r1, 0x7, &(0x7f0000000200)={0x1}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) uname(&(0x7f0000000080)=""/13) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x14) epoll_create(0x3) 22:45:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f75702e637075002a508f7202071613637ace8933066c294bb15e7e1a203dfd5893698f1ace33f72a3f2c7f5f5cca9324913053f73693537781e18477f9b1a223127b6c43f374e465f506ae88ff4091256188a1ce8bf2d2e738a1fbc7620db08e972cc1ebb3e4a8a566e4576f5eb174399be3cba55013960112d03559fdf8645eabbea015221705d0c00d581f626457121ebcb90cbbfde2cc1038b2b8f128c9e502e30b547a8e17d731e512276118c7b74609d46a5a9fa601a41a388348bf289093cdd39400fba1a5eebbd2c91d", 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x1) ftruncate(r1, 0x2081ff) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) syncfs(r2) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x1000000000000000}, 0xfffffffffffffd6a) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000040)={0x2, 0x3f, 0xb68a}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000100)={0x2, 0x1000, 0x4, 0xffffffffffffffd6, 0x8, 0x401, 0x6, 0x3, 0x5, 0xfff, 0xffffffff00000001, 0x5}) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000080)={{0x4, @rand_addr=0x10001, 0x4e24, 0x2, 'dh\x00', 0x15, 0x0, 0x4e}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x4e24, 0x10000, 0x0, 0x3, 0x81}}, 0x44) pkey_mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 22:45:31 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x44000) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) mlockall(0x3) 22:45:31 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:31 executing program 0: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000003c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000380)='fd\x00') fchdir(r1) r2 = memfd_create(&(0x7f0000000300), 0x0) write(r2, &(0x7f0000000240)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da", 0x40) write$FUSE_DIRENT(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="0d4690c2208f132767669224ab543d4a30babf288f3ae60cddfc84205ae19fee9112382eb92f32514fc7a50e23506b13ed74cf19f582d6f5684399dbdf06e75134c6e59375b73f103d6c0449207ab42a00b668376e1d43cea25746be5f66c2bc582a7f0900e34ff1deaa5af59d5f0490434e32b39209150e8e12b1fa9b887df3e78a2b9d20a35a09d9b5bc96701e090000007c4e02403b00c3300525315ee9c81b81f89cc152eec4103bae2564c7975f1da713000000000000000020000000000000"], 0xc2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, r2, 0x0, 0x3, &(0x7f0000000100)='fd\x00'}, 0x30) fcntl$setownex(r2, 0xf, &(0x7f00000002c0)={0x1, r3}) umount2(&(0x7f0000000040)='./file0/file0\x00', 0x0) 22:45:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x1, r1) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40000) signalfd(r1, &(0x7f0000000440)={0x800}, 0x8) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x899b, &(0x7f0000000240)={'syz_tun\x00', @ifru_names='veth1\x00'}) r4 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000001, 0x10, 0xffffffffffffffff, 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3ec7e1e3f09811624c2f43040cc8b8d570728e9fafff91e41a78f52db48", 0x2f}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r2) unlinkat(r2, &(0x7f00000003c0)='./file0\x00', 0x200) getpeername$packet(r2, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000580)=0x14) fstat(r2, &(0x7f00000001c0)) mknodat(r2, &(0x7f0000000280)='./file0\x00', 0x0, 0x9) sendfile(r2, r3, &(0x7f0000000300), 0x2000006) read$FUSE(0xffffffffffffffff, &(0x7f00000003c0), 0x1000) io_setup(0x7, &(0x7f0000000000)=0x0) io_submit(r5, 0x1, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x7, 0x8, r0, &(0x7f00000013c0)="b89c5d3e43c29f51d3acf46d968d9c3bc80840c4f2399e3eb2b561aa1eb124ca822cee547077fbfdacf3822e8295bd6145bca4951819b0244e1b86bf791a7adce1f30048dc9d54c29b6619566285e11e7e3459aed2fcc75d49973053b697dd792bc2ec4d1a422ae1e93b3031856ea588ad92dc1d21dd434254d427a7155d208ea5dd7a1af9f7e3ee6ed856bd31bdaa519ba4071fd544e484cc8d79555a6652b92f8873a9055cbd080003a352bf398e80aaf930070bdae2e1b4e31d04322fdcee604d3be29f3499ba59238766c7e68eb4a940320b11f6a5148b39031b8d4fc44672b675450856b9087ef07458ca9a0b", 0xef, 0x8, 0x0, 0x0, r4}]) 22:45:31 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000000)={0x9, 0xb, 0x39, 0x1, "9f0106f03ebd7e55928df63c0f94cfc72ef5f11e83fd6efd6fc15faf866fccac"}) setuid(0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/191) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) [ 698.428418] device lo left promiscuous mode 22:45:31 executing program 0: r0 = epoll_create(0x0) r1 = epoll_create(0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x8) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'L-', 0xf4}, 0x28, 0x2) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r3 = getpid() epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000000c0)={0x20000000}) sched_setscheduler(r3, 0x0, &(0x7f0000000000)) prctl$intptr(0x1c, 0x14e9) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f000050aff4)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 22:45:31 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') keyctl$link(0x8, r2, r2) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) keyctl$link(0x8, r2, r2) 22:45:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) [ 698.538428] device lo entered promiscuous mode 22:45:31 executing program 0: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x44000) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) mlockall(0x3) 22:45:31 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) capset(&(0x7f0000000240)={0x19980330}, &(0x7f0000000140)) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000100)={0x0, 0x0, 0x6}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setregs(0x837bec52358861b7, r0, 0x3ff, &(0x7f0000000180)="f7930b4ede9aade279e3ce86988e81e620714d403f652d28b5abb4efb79d04f58863deeb78937fe6760e36d7200760fff7e634c0c695a28b70f85fdc68da47e68bb4f63ed407ab3d1432dffe5f518c7585856478c268bbd814a982330b5b08cb487f86545923bdcf4b03bb36d371a86d12a7dc7977a87d969af8e65f78ab5a9ea8480bcf8862c9cfbd1cdbb7710f41c66ff1ab96b480f7f12ac6dec520118c5ad59429f2c3c13773fda9a7706566a4e801c13c672419cb85") 22:45:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x1, r1) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40000) signalfd(r1, &(0x7f0000000440)={0x800}, 0x8) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x899b, &(0x7f0000000240)={'syz_tun\x00', @ifru_names='veth1\x00'}) r4 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000001, 0x10, 0xffffffffffffffff, 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3ec7e1e3f09811624c2f43040cc8b8d570728e9fafff91e41a78f52db48", 0x2f}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r2) unlinkat(r2, &(0x7f00000003c0)='./file0\x00', 0x200) getpeername$packet(r2, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000580)=0x14) fstat(r2, &(0x7f00000001c0)) mknodat(r2, &(0x7f0000000280)='./file0\x00', 0x0, 0x9) sendfile(r2, r3, &(0x7f0000000300), 0x2000006) read$FUSE(0xffffffffffffffff, &(0x7f00000003c0), 0x1000) io_setup(0x7, &(0x7f0000000000)=0x0) io_submit(r5, 0x1, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x7, 0x8, r0, &(0x7f00000013c0)="b89c5d3e43c29f51d3acf46d968d9c3bc80840c4f2399e3eb2b561aa1eb124ca822cee547077fbfdacf3822e8295bd6145bca4951819b0244e1b86bf791a7adce1f30048dc9d54c29b6619566285e11e7e3459aed2fcc75d49973053b697dd792bc2ec4d1a422ae1e93b3031856ea588ad92dc1d21dd434254d427a7155d208ea5dd7a1af9f7e3ee6ed856bd31bdaa519ba4071fd544e484cc8d79555a6652b92f8873a9055cbd080003a352bf398e80aaf930070bdae2e1b4e31d04322fdcee604d3be29f3499ba59238766c7e68eb4a940320b11f6a5148b39031b8d4fc44672b675450856b9087ef07458ca9a0b", 0xef, 0x8, 0x0, 0x0, r4}]) 22:45:31 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) fchdir(r0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x82}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_getnetconf={0x24, 0x52, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x1}, @NETCONFA_FORWARDING={0x8, 0x2, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = eventfd2(0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000080)=ANY=[@ANYBLOB="970000000a004e2309000000fe8000000000000000000000000000bb070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000040000000a000000000000000135000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e230400000000000000000000000000000000000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2088000000fe80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2108000000ff0200000000000000000000000000010600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x28c) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x410401, 0x0) r3 = epoll_create1(0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000380)='/dev/keychord\x00', 0x301000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000040)) io_setup(0xa3c, &(0x7f0000001a00)=0x0) io_submit(r4, 0x1, &(0x7f0000329fd8)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000042000), 0x0, 0x0, 0x0, 0x1, r1}]) [ 698.695642] device lo left promiscuous mode 22:45:31 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000180)=r0) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000040)=0x3, 0x4) r1 = gettid() getpgrp(r1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x800) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) sendto$inet6(r0, &(0x7f0000000100), 0xd14b, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) 22:45:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x1, r1) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40000) signalfd(r1, &(0x7f0000000440)={0x800}, 0x8) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x899b, &(0x7f0000000240)={'syz_tun\x00', @ifru_names='veth1\x00'}) r4 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000001, 0x10, 0xffffffffffffffff, 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3ec7e1e3f09811624c2f43040cc8b8d570728e9fafff91e41a78f52db48", 0x2f}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r2) unlinkat(r2, &(0x7f00000003c0)='./file0\x00', 0x200) getpeername$packet(r2, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000580)=0x14) fstat(r2, &(0x7f00000001c0)) mknodat(r2, &(0x7f0000000280)='./file0\x00', 0x0, 0x9) sendfile(r2, r3, &(0x7f0000000300), 0x2000006) read$FUSE(0xffffffffffffffff, &(0x7f00000003c0), 0x1000) io_setup(0x7, &(0x7f0000000000)=0x0) io_submit(r5, 0x1, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x7, 0x8, r0, &(0x7f00000013c0)="b89c5d3e43c29f51d3acf46d968d9c3bc80840c4f2399e3eb2b561aa1eb124ca822cee547077fbfdacf3822e8295bd6145bca4951819b0244e1b86bf791a7adce1f30048dc9d54c29b6619566285e11e7e3459aed2fcc75d49973053b697dd792bc2ec4d1a422ae1e93b3031856ea588ad92dc1d21dd434254d427a7155d208ea5dd7a1af9f7e3ee6ed856bd31bdaa519ba4071fd544e484cc8d79555a6652b92f8873a9055cbd080003a352bf398e80aaf930070bdae2e1b4e31d04322fdcee604d3be29f3499ba59238766c7e68eb4a940320b11f6a5148b39031b8d4fc44672b675450856b9087ef07458ca9a0b", 0xef, 0x8, 0x0, 0x0, r4}]) 22:45:31 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000080)) setuid(0x0) write$binfmt_aout(r1, &(0x7f00000008c0)={{0x1cc, 0x3, 0x8, 0x35b, 0x1a8, 0x800000000000, 0x29e, 0xf1}, "972446c511e1e028a15b58ffc18afd0539b563861f045bc8d12bb4a856", [[], [], [], [], [], [], [], [], []]}, 0x93d) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000000)={'veth0\x00', 0xffffffffffffffe0}) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:31 executing program 3: clone(0x20802102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) sched_setscheduler(0x0, 0x400000000000005, &(0x7f0000000200)) accept4(0xffffffffffffffff, &(0x7f0000000340)=@xdp={0x2c, 0x0, 0x0}, &(0x7f00000003c0)=0x80, 0x80000) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000140)=ANY=[], &(0x7f0000000240)="5c8b4ce25e3acec88374766099290be879ee648f192835acbb84872b98ce40040b5ea7e3475de5db490bf2238d1f93124637cf0ab6ced30f93cdf06232f25da6830f0532fbee9d3f4c63f5967a2ee44312b789bfe506678868646727610253db9ff2523b32624ea197a6568b280c627187136e3c7dd22eac71ba1d29e7d08ab11580e4517c19bf903ae36eb039bfd5ac77e60b8c659ab8afbdb12ee825a6942268cd04cd8d504b0d8c6b1869f37d6692f6eefc3e761595b58374f80090316e0bf24d5a5e703fe041449ff8edc9804bf761cea7", 0x0, 0x0, 0x0, 0x0, 0x20000, [], r0, 0x9}, 0x235) 22:45:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r3, r2, 0x1, 0x0) r5 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r5, 0x1000000000013) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) [ 698.860264] device lo entered promiscuous mode 22:45:31 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0xfffffffffffffffe, 'bond_slave_1\x00', 0x4}, 0x12) ioctl(r0, 0x8916, &(0x7f0000000040)="738dbae072a516ecc49b14e2763848f49f8be8f34d36e397fe31bff2175653db5fa9aa642bf790fe732806cc850e0861296bf86bf4f174000000000000") ioctl(r0, 0x1, &(0x7f00000000c0)) 22:45:31 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020400000c000000000000003f5d00000200010000000000f86c46de00090000000000200500fac7105eace0a62d00000000000000000100000000000000a1e600dd000000010000000000000000030005010000000000000000000000000000"], 0x60}}, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000080)) r1 = socket$key(0xf, 0x3, 0x2) ioctl$BLKRAGET(r0, 0x1263, &(0x7f00000016c0)) recvmmsg(r0, &(0x7f0000002e40)=[{{&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000240)=""/133, 0x85}, {&(0x7f0000000300)=""/124, 0x7c}], 0x2, &(0x7f00000003c0)=""/4096, 0x1000, 0x1}, 0x16a702f3}, {{&(0x7f00000013c0)=@l2, 0x80, &(0x7f00000015c0)=[{&(0x7f0000001440)=""/173, 0xad}, {&(0x7f0000001500)=""/51, 0x33}, {&(0x7f0000001540)=""/101, 0x65}], 0x3, &(0x7f0000001600)=""/12, 0xc, 0x98}, 0x539e}, {{&(0x7f0000001640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f00000017c0)=[{&(0x7f00000016c0)}, {&(0x7f0000001700)=""/172, 0xac}], 0x2, 0x0, 0x0, 0x9}, 0xa0ac}, {{&(0x7f0000001800)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001880)=""/77, 0x4d}, {&(0x7f0000001900)=""/51, 0x33}, {&(0x7f0000001940)=""/72, 0x48}, {&(0x7f00000019c0)=""/132, 0x84}, {&(0x7f0000001a80)=""/174, 0xae}], 0x5, &(0x7f0000001b80)=""/40, 0x28, 0x5}, 0x98}, {{&(0x7f0000001bc0)=@rc, 0x80, &(0x7f0000002c40)=[{&(0x7f0000001c40)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x11}, 0x19db0a05}, {{&(0x7f0000002c80)=@l2, 0x80, &(0x7f0000002d40)=[{&(0x7f0000002d00)=""/11, 0xb}], 0x1, &(0x7f0000002d80)=""/180, 0xb4, 0x8}, 0x8000}], 0x6, 0x0, &(0x7f0000002f00)={0x0, 0x1c9c380}) sendmsg$nl_route_sched(r0, &(0x7f0000002fc0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000002f80)={&(0x7f0000003000)=ANY=[@ANYBLOB="661fe794b40565b07a53fc99e1e0740000000000000000000000000000000000", @ANYRES32=r2, @ANYBLOB="00000000f3ff0f000e00030008000b000700000008000b0001000100"], 0x34}, 0x1, 0x0, 0x0, 0x8001}, 0x4) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 22:45:31 executing program 3: readlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/30, 0x1e) r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) r1 = request_key(&(0x7f00000002c0)='ceph\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='{md5sum*loselinux\x00', 0xfffffffffffffffc) keyctl$negate(0xd, r0, 0x5e488e28, r1) munmap(&(0x7f0000000000/0x600000)=nil, 0x600000) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={@remote, @mcast1, @ipv4={[], [], @rand_addr}, 0x20000}) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/context\x00', 0x2, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000140)={@dev={0xfe, 0x80, [], 0xe}, @mcast1, @local, 0xdb0, 0x2, 0x4, 0x400, 0x3b, 0x0, r3}) 22:45:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x1, r1) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40000) signalfd(r1, &(0x7f0000000440)={0x800}, 0x8) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x899b, &(0x7f0000000240)={'syz_tun\x00', @ifru_names='veth1\x00'}) r4 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000001, 0x10, 0xffffffffffffffff, 0x0) pwritev(r4, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3ec7e1e3f09811624c2f43040cc8b8d570728e9fafff91e41a78f52db48", 0x2f}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r2) unlinkat(r2, &(0x7f00000003c0)='./file0\x00', 0x200) getpeername$packet(r2, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000580)=0x14) fstat(r2, &(0x7f00000001c0)) mknodat(r2, &(0x7f0000000280)='./file0\x00', 0x0, 0x9) sendfile(r2, r3, &(0x7f0000000300), 0x2000006) read$FUSE(0xffffffffffffffff, &(0x7f00000003c0), 0x1000) io_setup(0x7, &(0x7f0000000000)=0x0) io_submit(r5, 0x1, &(0x7f0000000080)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x7, 0x8, r0, &(0x7f00000013c0)="b89c5d3e43c29f51d3acf46d968d9c3bc80840c4f2399e3eb2b561aa1eb124ca822cee547077fbfdacf3822e8295bd6145bca4951819b0244e1b86bf791a7adce1f30048dc9d54c29b6619566285e11e7e3459aed2fcc75d49973053b697dd792bc2ec4d1a422ae1e93b3031856ea588ad92dc1d21dd434254d427a7155d208ea5dd7a1af9f7e3ee6ed856bd31bdaa519ba4071fd544e484cc8d79555a6652b92f8873a9055cbd080003a352bf398e80aaf930070bdae2e1b4e31d04322fdcee604d3be29f3499ba59238766c7e68eb4a940320b11f6a5148b39031b8d4fc44672b675450856b9087ef07458ca9a0b", 0xef, 0x8, 0x0, 0x0, r4}]) 22:45:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x35, 0x0, 0x0, 0x4c}, {0x400006}]}, 0x8) writev(r0, &(0x7f0000000300)=[{&(0x7f00000000c0)="9f", 0x1}], 0x1) close(r1) 22:45:31 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) write$P9_RREMOVE(r1, &(0x7f0000000180)={0x7, 0x7b, 0x1}, 0x7) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x8001, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) write$P9_RRENAMEAT(r1, &(0x7f00000001c0)={0x7, 0x4b, 0x1}, 0x7) r3 = syz_open_procfs(0x0, 0x0) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f00000008c0)=""/226) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x3a) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) socket$inet_tcp(0x2, 0x1, 0x0) personality(0x200000) 22:45:31 executing program 0: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000180)=r0) setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:31 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r1 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000080), &(0x7f0000000000)=0x6e, 0x80000) recvfrom$unix(r1, &(0x7f0000000140)=""/159, 0x9f, 0x100, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) [ 699.018087] device lo left promiscuous mode 22:45:32 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, r0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40000) signalfd(r0, &(0x7f0000000440)={0x800}, 0x8) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x899b, &(0x7f0000000240)={'syz_tun\x00', @ifru_names='veth1\x00'}) r3 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000001, 0x10, 0xffffffffffffffff, 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3ec7e1e3f09811624c2f43040cc8b8d570728e9fafff91e41a78f52db48", 0x2f}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r1) unlinkat(r1, &(0x7f00000003c0)='./file0\x00', 0x200) getpeername$packet(r1, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000580)=0x14) fstat(r1, &(0x7f00000001c0)) mknodat(r1, &(0x7f0000000280)='./file0\x00', 0x0, 0x9) sendfile(r1, r2, &(0x7f0000000300), 0x2000006) read$FUSE(0xffffffffffffffff, &(0x7f00000003c0), 0x1000) io_setup(0x7, &(0x7f0000000000)) 22:45:32 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000080)) setuid(0x0) write$binfmt_aout(r1, &(0x7f00000008c0)={{0x1cc, 0x3, 0x8, 0x35b, 0x1a8, 0x800000000000, 0x29e, 0xf1}, "972446c511e1e028a15b58ffc18afd0539b563861f045bc8d12bb4a856", [[], [], [], [], [], [], [], [], []]}, 0x93d) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000000)={'veth0\x00', 0xffffffffffffffe0}) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) 22:45:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340)="613652b169982969bc8a4aea429c84d6825ad889c0565ade99f69eaee6c5b2cfac35b51343a8c06ed893bbfb4043c6ea0effde602afdec3daacc405cea4f944fadeb63666a9386c89d1ac0e9097524fee08d40216ad19187776b268aa3687b919e418834db49dccdd3cb7834314f79ce44eacadf7ee6cc3ed8", 0x79) tee(r2, r1, 0x1, 0x0) r4 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f00000000c0)) tkill(r4, 0x1000000000013) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000000)={'lo\x00'}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f00000001c0)={"6c6f0000002400000000000008000011", 0x101}) [ 699.142613] device lo entered promiscuous mode 22:45:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000d12000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000013c0)={0x0}, &(0x7f0000001400)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001440)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000001540)=0xe8) r4 = getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000015c0)={0x0, 0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001580)='!vmnet0\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001600)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000001700)=0xe8) fstat(r1, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000002300)={0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001800)={{{@in6=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000001900)=0xe8) getresgid(&(0x7f0000001940)=0x0, &(0x7f0000001980), &(0x7f00000019c0)) fcntl$getownex(r0, 0x10, &(0x7f0000001a00)) getresuid(&(0x7f0000001a40), &(0x7f0000001a80), &(0x7f0000001ac0)) lstat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)) fcntl$getownex(r0, 0x10, &(0x7f0000001bc0)={0x0, 0x0}) fstat(r0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000001c80)=[0x0, 0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) r15 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001cc0)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@local}}, &(0x7f0000001dc0)=0xe8) getgroups(0x2, &(0x7f0000001e00)=[0xee01, 0xee01]) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e40)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001e80)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f0000002080)={0x0, 0x0}) stat(&(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)={0x0, 0x0, 0x0, 0x0, 0x0}) r23 = getegid() sendmmsg$unix(r1, &(0x7f0000002280)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001380)=[{&(0x7f0000000080)="f5d5f71463e4842c760d587be08d92a47dbc2490f39bddedbd87cda6fdb095823c023f6400910acf816f56975795b96f119d6d466935953a5fc7628339aa535113d138551bf6c349aac70c13a704c06dccc220f5313cafde4f01045f9cf2759cba8b", 0x62}, {&(0x7f0000000100)="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", 0x1000}, {&(0x7f0000001100)="c9d8912ea36eb5be076e1d8242cb105eb35299777ad62f731fe37743424818a14b16c530abbd9e2c231afd7aaf03572a66d60261fd1ce6bb668fbc14b54bb3029765404fd1e425b6d4fc0aa76054980785de69e8c2a95b230d5c431a14187c667ef255e68d95dd6b7ebaeb", 0x6b}, {&(0x7f0000001300)="cf6e0cf97f4b7cc9a7a4643f6e6beca58a50652f6c0c3b1dfded5b65c55fa5d559e198bbe3a1fa6ac9e06b620295026ed1718dc01d36724f3f455f2b284c4de666a8c27f", 0x44}, {&(0x7f0000001180)="a5a3d7ba92e8b6bf597f53e2fcd0b0475b4e00069b5d4e7b5d1cbf88ea049d6985df7d9455097958bc", 0x29}], 0x5, &(0x7f0000002480)=ANY=[@ANYBLOB="180000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="18001905a982d2e4000000", @ANYRES32=r5, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="180000000100000002000000", @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="180000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r6, @ANYBLOB="180000000100000002000000", @ANYRES32=r12, @ANYRES32=r13, @ANYRES32=r14, @ANYBLOB="18000000b9cc000002000000", @ANYRES32=r15, @ANYRES32=r16, @ANYRES32=r17, @ANYBLOB="180000000100000002200000", @ANYRES32=r18, @ANYRES32=r19, @ANYRES32=r20, @ANYBLOB="1800008301043a00020000005219338ca6fb4a8d04a77e1e9688ee861e262577456dbc021a67da58c23e4472b4b79b762f83e329e83a1469d32a874125606b971bd150c618a0d30721ed0265c98f857a7e40973140fed18459df309675889429ee", @ANYRES32=r21, @ANYRES32=r22, @ANYRES32=r23, @ANYBLOB="140000000100000001000000", @ANYRES32=r0, @ANYRES32=r1], 0xd4, 0x40000}], 0x1, 0x0) readv(r1, &(0x7f00000012c0)=[{&(0x7f00000011c0)=""/241, 0xf1}], 0x1) r24 = epoll_create1(0x0) ioctl$EXT4_IOC_MIGRATE(r24, 0x6609) dup2(r24, r0) [ 699.196571] ================================================================== [ 699.203987] BUG: KASAN: use-after-free in disk_unblock_events+0x51/0x60 [ 699.210757] Read of size 8 at addr ffff880196c61660 by task syz-executor0/2089 [ 699.218105] [ 699.219725] CPU: 0 PID: 2089 Comm: syz-executor0 Not tainted 4.9.135+ #15 [ 699.226652] ffff8801af5276e8 ffffffff81b36bf9 ffffea00065b1800 ffff880196c61660 [ 699.234713] 0000000000000000 ffff880196c61660 0000000000000000 ffff8801af527720 22:45:32 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x400000, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000000c0), 0x4) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000080)}) socket$nl_route(0x10, 0x3, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) sendto$inet6(r1, &(0x7f0000000140)="7f093915bbde160bae6050898b0e61e69627203990968a94d731ccd9717a48", 0x1f, 0x4040, &(0x7f0000000180)={0xa, 0x4e21, 0x2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x15}}, 0x5}, 0x1c) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x309000, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x0) [ 699.242781] ffffffff815009ad ffff880196c61660 0000000000000008 0000000000000000 [ 699.250859] Call Trace: [ 699.253447] [] dump_stack+0xc1/0x128 [ 699.258814] [] print_address_description+0x6c/0x234 [ 699.265484] [] kasan_report.cold.6+0x242/0x2fe [ 699.271723] [] ? disk_unblock_events+0x51/0x60 [ 699.277971] [] __asan_report_load8_noabort+0x14/0x20 [ 699.284725] [] disk_unblock_events+0x51/0x60 [ 699.290796] [] __blkdev_get+0x6b6/0xd60 22:45:32 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xc0, r2, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x1d}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x22}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7fffffff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xffff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xa92}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x80000001}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x859}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x800}, 0x8000) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x0) [ 699.296417] [] ? __blkdev_put+0x840/0x840 [ 699.302213] [] ? fsnotify+0x114/0x1100 [ 699.307759] [] blkdev_get+0x2da/0x920 [ 699.313213] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 699.319964] [] ? bd_may_claim+0xd0/0xd0 [ 699.325589] [] ? bd_acquire+0x27/0x250 [ 699.331125] [] ? bd_acquire+0x88/0x250 [ 699.336702] [] ? _raw_spin_unlock+0x2c/0x50 22:45:32 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) [ 699.342674] [] blkdev_open+0x1a5/0x250 [ 699.348214] [] do_dentry_open+0x3ef/0xc90 [ 699.354016] [] ? blkdev_get_by_dev+0x70/0x70 [ 699.360078] [] vfs_open+0x11c/0x210 [ 699.365354] [] ? may_open.isra.20+0x14f/0x2a0 [ 699.371497] [] path_openat+0x542/0x2790 [ 699.377121] [] ? path_mountpoint+0x6c0/0x6c0 [ 699.383180] [] ? trace_hardirqs_on+0x10/0x10 [ 699.389239] [] ? expand_files.part.3+0x3a9/0x6d0 22:45:32 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) io_setup(0x0, &(0x7f0000000040)) clone(0x210007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) unshare(0x2000000040000804) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x80000001) tgkill(r1, r1, 0x36) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth0_to_bond\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') getuid() setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) 22:45:32 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x2a) [ 699.395648] [] do_filp_open+0x197/0x270 [ 699.401271] [] ? may_open_dev+0xe0/0xe0 [ 699.406895] [] ? _raw_spin_unlock+0x2c/0x50 [ 699.412866] [] ? __alloc_fd+0x1d7/0x4a0 [ 699.418492] [] do_sys_open+0x30d/0x5c0 [ 699.424035] [] ? filp_open+0x70/0x70 [ 699.429393] [] ? SyS_mkdirat+0x15e/0x240 [ 699.435124] [] ? SyS_mknod+0x40/0x40 [ 699.440485] [] ? task_work_run+0x14a/0x180 [ 699.446374] [] compat_SyS_open+0x2a/0x40 [ 699.452084] [] ? compat_SyS_getdents64+0x280/0x280 [ 699.458662] [] do_fast_syscall_32+0x2f1/0xa10 [ 699.464806] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 699.471474] [] entry_SYSENTER_compat+0x90/0xa2 [ 699.477696] [ 699.479319] Allocated by task 12236: [ 699.483044] save_stack_trace+0x16/0x20 [ 699.487022] kasan_kmalloc.part.1+0x62/0xf0 [ 699.491338] kasan_kmalloc+0xaf/0xc0 22:45:32 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000400)="e6d112c41ab06463283a3e0c95b0dfd5009996cfc18d0ac32508a927b75253ecc379d82a8d585701db1d8ee20bdac91c3a594bda972faef433d32f18942b96762b89b5fb281ec25a14e6761181a661df83203005bd13c1a33a2062f6661fbf") r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$RTC_PIE_ON(r1, 0x7005) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e24, 0x100000001, @dev={0xfe, 0x80, [], 0x12}, 0x2}, {0xa, 0x4e20, 0x0, @local, 0x1}, 0x4, [0xffffffffffff0001, 0x40000000800, 0x3, 0x7, 0x1, 0x10001, 0x100000001, 0x4]}, 0x5c) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) 22:45:32 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80046601, &(0x7f00000000c0)) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000080)={0xaf41, 0x7, 0x1}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x1) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) request_key(&(0x7f0000000880)='.dead\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x4, 0xde}) inotify_init1(0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x0) [ 699.495048] kmem_cache_alloc_trace+0x117/0x2e0 [ 699.499706] alloc_disk_node+0x54/0x3a0 [ 699.503665] alloc_disk+0x18/0x20 [ 699.507114] loop_add+0x368/0x7a0 [ 699.510564] loop_control_ioctl+0x136/0x300 [ 699.514881] compat_SyS_ioctl+0x12d/0x1fd0 [ 699.519115] do_fast_syscall_32+0x2f1/0xa10 [ 699.523436] entry_SYSENTER_compat+0x90/0xa2 [ 699.528092] [ 699.529715] Freed by task 2089: [ 699.533017] save_stack_trace+0x16/0x20 [ 699.536986] kasan_slab_free+0xac/0x190 [ 699.540993] kfree+0xfb/0x310 [ 699.544108] disk_release+0x259/0x330 22:45:32 executing program 4: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x35d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0), 0x0, 0x2000, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000002c0)='/dev/vga_arbiter\x00', &(0x7f0000000300)='IPVS\x00', &(0x7f0000000340)='/dev/loop-control\x00', &(0x7f00000003c0)='/dev/uhid\x00'], &(0x7f00000000c0)=[&(0x7f00000005c0)='IPVS\x00', &(0x7f0000000600)='IPVS\x00', &(0x7f0000000700)='\x00', &(0x7f0000000740)='(]keyring\x00'], 0x800) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) request_key(&(0x7f0000000880)='syzkaller\x00', &(0x7f0000000680), &(0x7f0000000840)="93", 0xfffffffffffffff9) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='task\x00') setuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') ioctl$KDGETKEYCODE(0xffffffffffffff9c, 0x4b4c, &(0x7f0000000040)={0x10001, 0xde}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x1, 0xffffffffffffff2f) sendto$inet6(r1, &(0x7f0000000ac0)="7aec4738888635d40fd0bea2ee7bb1a921a0c2b6c319a98fce4e40a8c74d2e5f3f5fefb1fe2a32daa4dd24e07bdb807eca56650e73a52bf4b4e5da0c39f88f5b85ff56c130245c5a12e67630a7a50c381569f17b7d78f53c39f732321137973a857f6526e9b1d1782bed9ba6a6b96ccebc84289381700d4c86a5c2c968f5894536c9920194c6d6b085580df15f549b1912f9d6760a2104be00bd6ba5c3bc3a464ba4d02f6896c44b01b2103f17ea16b3b27dde3e11e0aca5b79e3f45b00efebde9e7382f8872554f27", 0xc9, 0x48805, &(0x7f00000001c0)={0xa, 0x4e22, 0x6, @dev={0xfe, 0x80, [], 0x1c}, 0x8}, 0x1c) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000000)) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x32) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x5100}) [ 699.547905] device_release+0x7e/0x220 [ 699.551796] kobject_put+0x148/0x250 [ 699.555506] put_disk+0x23/0x30 [ 699.558781] __blkdev_get+0x616/0xd60 [ 699.562577] blkdev_get+0x2da/0x920 [ 699.566200] blkdev_open+0x1a5/0x250 [ 699.569918] do_dentry_open+0x3ef/0xc90 [ 699.573895] vfs_open+0x11c/0x210 [ 699.577346] path_openat+0x542/0x2790 [ 699.581141] do_filp_open+0x197/0x270 [ 699.584934] do_sys_open+0x30d/0x5c0 [ 699.588646] compat_SyS_open+0x2a/0x40 [ 699.592529] do_fast_syscall_32+0x2f1/0xa10 [ 699.596842] entry_SYSENTER_compat+0x90/0xa2 [ 699.601239] [ 699.602864] The buggy address belongs to the object at ffff880196c61100 [ 699.602864] which belongs to the cache kmalloc-2048 of size 2048 [ 699.615703] The buggy address is located 1376 bytes inside of [ 699.615703] 2048-byte region [ffff880196c61100, ffff880196c61900) [ 699.627755] The buggy address belongs to the page: [ 699.632686] page:ffffea00065b1800 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 699.642926] flags: 0x4000000000004080(slab|head) [ 699.647679] page dumped because: kasan: bad access detected [ 699.653377] [ 699.654998] Memory state around the buggy address: [ 699.659929] ffff880196c61500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 699.667279] ffff880196c61580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 699.674625] >ffff880196c61600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 699.681978] ^ [ 699.688470] ffff880196c61680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 699.695817] ffff880196c61700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 699.703150] ================================================================== [ 699.710490] Disabling lock debugging due to kernel taint [ 699.716603] Kernel panic - not syncing: panic_on_warn set ... [ 699.716603] [ 699.723979] CPU: 0 PID: 2089 Comm: syz-executor0 Tainted: G B 4.9.135+ #15 [ 699.732115] ffff8801af527648 ffffffff81b36bf9 ffffffff82e366e0 00000000ffffffff [ 699.740192] 0000000000000000 0000000000000000 0000000000000000 ffff8801af527708 [ 699.748254] ffffffff813f6aa5 0000000041b58ab3 ffffffff82e2a6e3 ffffffff813f68e6 [ 699.756307] Call Trace: [ 699.758905] [] dump_stack+0xc1/0x128 [ 699.764268] [] panic+0x1bf/0x39f [ 699.769264] [] ? add_taint.cold.6+0x16/0x16 [ 699.775217] [] ? ___preempt_schedule+0x16/0x18 [ 699.781427] [] kasan_end_report+0x47/0x4f [ 699.787211] [] kasan_report.cold.6+0x76/0x2fe [ 699.793348] [] ? disk_unblock_events+0x51/0x60 [ 699.799560] [] __asan_report_load8_noabort+0x14/0x20 [ 699.806298] [] disk_unblock_events+0x51/0x60 [ 699.812354] [] __blkdev_get+0x6b6/0xd60 [ 699.817968] [] ? __blkdev_put+0x840/0x840 [ 699.823760] [] ? fsnotify+0x114/0x1100 [ 699.829306] [] blkdev_get+0x2da/0x920 [ 699.834749] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 699.841490] [] ? bd_may_claim+0xd0/0xd0 [ 699.847106] [] ? bd_acquire+0x27/0x250 [ 699.852620] [] ? bd_acquire+0x88/0x250 [ 699.858151] [] ? _raw_spin_unlock+0x2c/0x50 [ 699.864117] [] blkdev_open+0x1a5/0x250 [ 699.869646] [] do_dentry_open+0x3ef/0xc90 [ 699.875433] [] ? blkdev_get_by_dev+0x70/0x70 [ 699.881488] [] vfs_open+0x11c/0x210 [ 699.886783] [] ? may_open.isra.20+0x14f/0x2a0 [ 699.892925] [] path_openat+0x542/0x2790 [ 699.898539] [] ? path_mountpoint+0x6c0/0x6c0 [ 699.904580] [] ? trace_hardirqs_on+0x10/0x10 [ 699.910627] [] ? expand_files.part.3+0x3a9/0x6d0 [ 699.917059] [] do_filp_open+0x197/0x270 [ 699.922663] [] ? may_open_dev+0xe0/0xe0 [ 699.928269] [] ? _raw_spin_unlock+0x2c/0x50 [ 699.934229] [] ? __alloc_fd+0x1d7/0x4a0 [ 699.939854] [] do_sys_open+0x30d/0x5c0 [ 699.945380] [] ? filp_open+0x70/0x70 [ 699.950736] [] ? SyS_mkdirat+0x15e/0x240 [ 699.956463] [] ? SyS_mknod+0x40/0x40 [ 699.961814] [] ? task_work_run+0x14a/0x180 [ 699.967686] [] compat_SyS_open+0x2a/0x40 [ 699.973380] [] ? compat_SyS_getdents64+0x280/0x280 [ 699.979938] [] do_fast_syscall_32+0x2f1/0xa10 [ 699.986079] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 699.992726] [] entry_SYSENTER_compat+0x90/0xa2 [ 699.999269] Kernel Offset: disabled [ 700.002887] Rebooting in 86400 seconds..